CVE-2019-20454

Published: 14 February 2020

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
pcre2
Launchpad, Ubuntu, Debian
Upstream
Released (10.34-1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(10.34-7)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(10.34-7)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(10.34-7)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(code not present)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://vcs.pcre.org/pcre2?view=revision&revision=1092
Upstream: https://vcs.pcre.org/pcre2?view=revision&revision=1091