Mageia 2020-0305: pcre2 security update
Summary
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern
\X is JIT compiled and used to match specially crafted subjects in non-UTF
mode. Applications that use PCRE to parse untrusted input may be vulnerable
to this flaw, which would allow an attacker to crash the application. The
flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c. (CVE-2019-20454)
References
- https://bugs.mageia.org/show_bug.cgi?id=26932
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/OQRAHYHLRNMBTPR3KXVM27NSZP3KTOPI/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20454
Resolution
MGASA-2020-0305 - Updated pcre2 packages fix security vulnerability
SRPMS
- 7/core/pcre2-10.33-1.2.mga7