Hide Forgot
A vulnerability was found in libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454. References: https://bugs.gentoo.org/717920 https://www.pcre.org/original/changelog.txt
Created mingw-pcre tracking bugs for this issue: Affects: fedora-all [bug 1848446] Created pcre tracking bugs for this issue: Affects: fedora-all [bug 1848445]
Upstream fix <https://vcs.pcre.org/pcre?view=revision&revision=1740>.
The flaw is in the file pcre_jit_compile.c routine, compile_iterator_matchingpath(). The affected code is not in versions of pcre shipped with Red Hat Enterprise Linux 5, 6, or 7.
Upstream bug report for this is: https://bugs.exim.org/show_bug.cgi?id=2320
Mitigation: Do not use more than one fixed quantifier with \R or \X with UTF disabled in PCRE or PCRE2, as these are the conditions needed to trigger the flaw.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4373 https://access.redhat.com/errata/RHSA-2021:4373
This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2021:4613 https://access.redhat.com/errata/RHSA-2021:4613
This issue has been addressed in the following products: JBoss Core Services on RHEL 7 JBoss Core Services for RHEL 8 Via RHSA-2021:4614 https://access.redhat.com/errata/RHSA-2021:4614