USN-5627-1: PCRE vulnerabilities
22 September 2022
PCRE could be made to expose sensitive information.
Releases
Packages
- pcre2 - Perl 5 Compatible Regular Expression Library
Details
It was discovered that PCRE incorrectly handled memory when
handling certain regular expressions. An attacker could possibly
use this issue to cause applications using PCRE to expose
sensitive information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
libpcre2-16-0
-
10.39-3ubuntu0.1
-
libpcre2-32-0
-
10.39-3ubuntu0.1
-
libpcre2-posix3
-
10.39-3ubuntu0.1
-
pcre2-utils
-
10.39-3ubuntu0.1
-
libpcre2-8-0
-
10.39-3ubuntu0.1
Ubuntu 20.04
-
libpcre2-16-0
-
10.34-7ubuntu0.1
-
libpcre2-32-0
-
10.34-7ubuntu0.1
-
libpcre2-posix2
-
10.34-7ubuntu0.1
-
pcre2-utils
-
10.34-7ubuntu0.1
-
libpcre2-8-0
-
10.34-7ubuntu0.1
After a standard system update you need to restart applications using PCRE,
such as the Apache HTTP server and Nginx, to make all the necessary
changes.
References
Related notices
- USN-5627-2: libpcre2-32-0, libpcre2-posix0, pcre2, libpcre2-16-0, libpcre2-dev, libpcre2-8-0, pcre2-utils