vulnerability
Red Hat: CVE-2019-20454: CVE-2019-20454 pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Feb 14, 2020 | Sep 9, 2020 | Aug 11, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Feb 14, 2020
Added
Sep 9, 2020
Modified
Aug 11, 2025
Description
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-apcu-panelredhat-upgrade-libzipredhat-upgrade-libzip-debuginforedhat-upgrade-libzip-debugsourceredhat-upgrade-libzip-develredhat-upgrade-libzip-toolsredhat-upgrade-libzip-tools-debuginforedhat-upgrade-pcre2redhat-upgrade-pcre2-debuginforedhat-upgrade-pcre2-debugsourceredhat-upgrade-pcre2-develredhat-upgrade-pcre2-toolsredhat-upgrade-pcre2-tools-debuginforedhat-upgrade-pcre2-utf16redhat-upgrade-pcre2-utf16-debuginforedhat-upgrade-pcre2-utf32redhat-upgrade-pcre2-utf32-debuginforedhat-upgrade-phpredhat-upgrade-php-bcmathredhat-upgrade-php-bcmath-debuginforedhat-upgrade-php-cliredhat-upgrade-php-cli-debuginforedhat-upgrade-php-commonredhat-upgrade-php-common-debuginforedhat-upgrade-php-dbaredhat-upgrade-php-dba-debuginforedhat-upgrade-php-dbgredhat-upgrade-php-dbg-debuginforedhat-upgrade-php-debuginforedhat-upgrade-php-debugsourceredhat-upgrade-php-develredhat-upgrade-php-embeddedredhat-upgrade-php-embedded-debuginforedhat-upgrade-php-enchantredhat-upgrade-php-enchant-debuginforedhat-upgrade-php-fpmredhat-upgrade-php-fpm-debuginforedhat-upgrade-php-gdredhat-upgrade-php-gd-debuginforedhat-upgrade-php-gmpredhat-upgrade-php-gmp-debuginforedhat-upgrade-php-intlredhat-upgrade-php-intl-debuginforedhat-upgrade-php-jsonredhat-upgrade-php-json-debuginforedhat-upgrade-php-ldapredhat-upgrade-php-ldap-debuginforedhat-upgrade-php-mbstringredhat-upgrade-php-mbstring-debuginforedhat-upgrade-php-mysqlndredhat-upgrade-php-mysqlnd-debuginforedhat-upgrade-php-odbcredhat-upgrade-php-odbc-debuginforedhat-upgrade-php-opcacheredhat-upgrade-php-opcache-debuginforedhat-upgrade-php-pdoredhat-upgrade-php-pdo-debuginforedhat-upgrade-php-pearredhat-upgrade-php-pecl-apcuredhat-upgrade-php-pecl-apcu-debuginforedhat-upgrade-php-pecl-apcu-debugsourceredhat-upgrade-php-pecl-apcu-develredhat-upgrade-php-pecl-rrdredhat-upgrade-php-pecl-rrd-debuginforedhat-upgrade-php-pecl-rrd-debugsourceredhat-upgrade-php-pecl-xdebugredhat-upgrade-php-pecl-xdebug-debuginforedhat-upgrade-php-pecl-xdebug-debugsourceredhat-upgrade-php-pecl-zipredhat-upgrade-php-pecl-zip-debuginforedhat-upgrade-php-pecl-zip-debugsourceredhat-upgrade-php-pgsqlredhat-upgrade-php-pgsql-debuginforedhat-upgrade-php-processredhat-upgrade-php-process-debuginforedhat-upgrade-php-recoderedhat-upgrade-php-recode-debuginforedhat-upgrade-php-snmpredhat-upgrade-php-snmp-debuginforedhat-upgrade-php-soapredhat-upgrade-php-soap-debuginforedhat-upgrade-php-xmlredhat-upgrade-php-xml-debuginforedhat-upgrade-php-xmlrpcredhat-upgrade-php-xmlrpc-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.