pcre2 is vulnerable to out of bounds read. The vulnerability exists due to a memory corruption in the get_recurse_data_length()
function of the pcre2_jit_compile.c
file which allows an attacker to crash the application.
bugzilla.redhat.com/show_bug.cgi?id=2077983,
github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
lists.debian.org/debian-lts-announce/2023/03/msg00014.html
lists.fedoraproject.org/archives/list/[email protected]/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
lists.fedoraproject.org/archives/list/[email protected]/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
lists.fedoraproject.org/archives/list/[email protected]/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
lists.fedoraproject.org/archives/list/[email protected]/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
secdb.alpinelinux.org/edge/main.yaml
security.netapp.com/advisory/ntap-20221028-0009/