Security Advisories (1)
CVE-2019-20454 (2020-02-14)

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

NAME

MarpaX::ESLIF::Symbol::EventBitSet - ESLIF Symbol Event Bit Set

VERSION

version 6.0.21

SYNOPSIS

use MarpaX::ESLIF;

my $symbolEventBitSet;
$symbolEventBitSet = MarpaX::ESLIF::Symbol::EventBitSet->MARPAESLIF_SYMBOL_EVENT_COMPLETION;  #  0x01
$symbolEventBitSet = MarpaX::ESLIF::Symbol::EventBitSet->MARPAESLIF_SYMBOL_EVENT_NULLED;      #  0x02
$symbolEventBitSet = MarpaX::ESLIF::Symbol::EventBitSet->MARPAESLIF_SYMBOL_EVENT_PREDICTION;  #  0x04

DESCRIPTION

ESLIF symbol event bitset is made of constants, mapping the low-level Marpa view of symbol events. This module is giving access to them.

AUTHOR

Jean-Damien Durand <jeandamiendurand@free.fr>

COPYRIGHT AND LICENSE

This software is copyright (c) 2017 by Jean-Damien Durand.

This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.