Security Advisories (1)
CVE-2019-20454 (2020-02-14)

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

NAME

MarpaX::ESLIF::Base - ESLIF base

VERSION

version 6.0.13

DESCRIPTION

All MarpaX::ESLIF object inherits from this class, that takes care of clone and proper order destruction.

METHODS

$class->new($clonable, $eq, $allocate, $dispose, @arguments)

Generic constructor using $allocate-(@args)>. If $eq is set, the instance is implicitly a multiton. If $clonable is a true value, the instance is clonable.

$self->DESTROY()

Generic destructor. It always calls $self's dispose method.

CLONE()

Manages clonable instances.

$class->SHALLOW($engine)

Create a shallow instance of $class based on $engine, that is required. This instance cannot be cloned and, when being destroyed, will have no effect on the engine.

AUTHOR

Jean-Damien Durand <jeandamiendurand@free.fr>

COPYRIGHT AND LICENSE

This software is copyright (c) 2017 by Jean-Damien Durand.

This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.