vulnerability
Alma Linux: CVE-2019-20454: Moderate: pcre2 security and enhancement update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Feb 14, 2020 | May 4, 2022 | Jul 22, 2022 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Feb 14, 2020
Added
May 4, 2022
Modified
Jul 22, 2022
Description
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
Solution(s)
alma-upgrade-apcu-panelalma-upgrade-libzipalma-upgrade-libzip-develalma-upgrade-libzip-toolsalma-upgrade-pcre2alma-upgrade-pcre2-develalma-upgrade-pcre2-toolsalma-upgrade-pcre2-utf16alma-upgrade-pcre2-utf32alma-upgrade-phpalma-upgrade-php-bcmathalma-upgrade-php-clialma-upgrade-php-commonalma-upgrade-php-dbaalma-upgrade-php-dbgalma-upgrade-php-develalma-upgrade-php-embeddedalma-upgrade-php-enchantalma-upgrade-php-fpmalma-upgrade-php-gdalma-upgrade-php-gmpalma-upgrade-php-intlalma-upgrade-php-jsonalma-upgrade-php-ldapalma-upgrade-php-mbstringalma-upgrade-php-mysqlndalma-upgrade-php-odbcalma-upgrade-php-opcachealma-upgrade-php-pdoalma-upgrade-php-pearalma-upgrade-php-pecl-apcualma-upgrade-php-pecl-apcu-develalma-upgrade-php-pecl-rrdalma-upgrade-php-pecl-xdebugalma-upgrade-php-pecl-zipalma-upgrade-php-pgsqlalma-upgrade-php-processalma-upgrade-php-recodealma-upgrade-php-snmpalma-upgrade-php-soapalma-upgrade-php-xmlalma-upgrade-php-xmlrpc

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.