Security Advisories (1)
CVE-2019-20454 (2020-02-14)

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

Changes for version 0.013000 - 2017-07-22

  • Windows, Properly Require Alien::Build & Alien::MSYS & Alien::gmake
  • Require Test2::Suite v0.000072 For Test2::V0

Documentation

Modules

Find or download/build/install libpcre2 in PCRE2, the new Perl Compatible Regular Expression engine