pcre2test.c in PCRE2 10.23 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression.
{ "availability": "No subscription required", "ubuntu_priority": "negligible", "binaries": [ { "binary_version": "10.31-2", "binary_name": "libpcre2-16-0" }, { "binary_version": "10.31-2", "binary_name": "libpcre2-32-0" }, { "binary_version": "10.31-2", "binary_name": "libpcre2-8-0" }, { "binary_version": "10.31-2", "binary_name": "libpcre2-8-0-udeb" }, { "binary_version": "10.31-2", "binary_name": "libpcre2-dbg" }, { "binary_version": "10.31-2", "binary_name": "libpcre2-dev" }, { "binary_version": "10.31-2", "binary_name": "libpcre2-posix0" }, { "binary_version": "10.31-2", "binary_name": "pcre2-utils" } ] }