Bug 2391338 (CVE-2025-58050) - CVE-2025-58050 pcre2: PCRE2: heap-buffer-overflow read in match_ref due to missing boundary restoration in SCS
Summary: CVE-2025-58050 pcre2: PCRE2: heap-buffer-overflow read in match_ref due to mi...
Keywords:
Status: NEW
Alias: CVE-2025-58050
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-08-27 19:01 UTC by OSIDB Bzimport
Modified: 2025-09-16 00:16 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-08-27 19:01:17 UTC
The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.


Note You need to log in before you can comment on or make changes to this bug.