Описание
The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.
Отчет
Red Hat ships version 10.45 which is the affected version of this PCRE2 library in only one of its products - fedora-42.
Меры по смягчению последствий
If the user must stay on 10.45 temporarily, they should block patterns containing (*scs: or (*ACCEPT) in untrusted contexts. Otherwise, upgrading the PCRE2 version to 10.46 fixes this issue
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | mingw-pcre2 | Not affected | ||
Red Hat Enterprise Linux 10 | pcre2 | Not affected | ||
Red Hat Enterprise Linux 7 | pcre2 | Not affected | ||
Red Hat Enterprise Linux 8 | pcre2 | Not affected | ||
Red Hat Enterprise Linux 9 | mingw-pcre2 | Not affected | ||
Red Hat Enterprise Linux 9 | pcre2 | Not affected | ||
Red Hat OpenShift Container Platform 4 | rhcos | Not affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.
The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.
The PCRE2 library is a set of C functions that implement regular expre ...
EPSS
6.5 Medium
CVSS3