Security Advisories (1)
CVE-2019-20454 (2020-02-14)

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

NAME

Alien::PCRE2 - Find or download/build/install libpcre2 in PCRE2, the new Perl Compatible Regular Expression engine

SYNOPSIS

From a Perl script

use Alien::PCRE2;
use Env qw(@PATH);
unshift @PATH, Alien::PCRE2->bin_dir();  # `pcre2-config` and `pcre2grep` commands are now in your path

From Alien::Base Makefile.PL

ADD CODE HERE

DESCRIPTION

This package can be used by other CPAN modules that require PCRE2 or libpcre2.

AUTHOR

William N. Braswell, Jr. <wbraswell@cpan.org>

COPYRIGHT AND LICENSE

This software is copyright (c) 2017 by William N. Braswell, Jr.;

This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.