Security Advisories (1)
CVE-2019-20454 (2020-02-14)

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

Changes for version 2.0.4 - 2017-05-07

  • Jean-Damien Durand <jeandamiendurand@free.fr>
    • Version 2.0.4 [ci skip]
    • Version 2.0.3 [ci skip]
    • 3rdparty/tar/pcre2-10.23-patched.tar.gz
    • Use 3rdparty/tar/pcre2-10.23-patched.tar.gz instead of 3rdparty/tar/pcre2-10.22.tar.gz
    • Merge commit '72e47428776594f80be87be687e7036f083cd923' [ci skip]
    • Squashed '3rdparty/github/tconv/' changes from ec267612..a747a2e6
    • Squashed '3rdparty/github/genericStack/' changes from d9ef92d5..a31a3463
    • Merge commit '1552a28b5cde796e0640ff3b9c4e522690057a42' [ci skip]

Modules

ESLIF is Extended ScanLess InterFace
ESLIF Event Types
ESLIF Logger levels
ESLIF Value Types