libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
References
| Link | Resource |
|---|---|
| https://bugs.gentoo.org/717920 | Issue Tracking Patch Third Party Advisory |
| https://www.pcre.org/original/changelog.txt | Release Notes Vendor Advisory |
| https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ | Third Party Advisory |
| https://support.apple.com/kb/HT211931 | Third Party Advisory |
| http://seclists.org/fulldisclosure/2020/Dec/32 | Mailing List Third Party Advisory |
| https://support.apple.com/kb/HT212147 | Third Party Advisory |
| http://seclists.org/fulldisclosure/2021/Feb/14 | Mailing List Third Party Advisory |
| https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E | Mailing List Third Party Advisory |
| https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2020-06-15 17:15
Updated : 2022-04-28 15:06
NVD link : CVE-2020-14155
Mitre link : CVE-2020-14155
JSON object : View
Products Affected
apple
- macos
gitlab
- gitlab
pcre
- pcre
oracle
- communications_cloud_native_core_policy
CWE
CWE-190
Integer Overflow or Wraparound
