File _patchinfo of Package patchinfo.21543

<patchinfo incident="21543">
  <issue tracker="bnc" id="1172974">VUL-1: CVE-2020-14155: pcre: libpcre allows an integer overflow via a large number after a (?C substring</issue>
  <issue tracker="bnc" id="1172973">VUL-1: CVE-2019-20838: pcre: libpcre allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier</issue>
  <issue tracker="cve" id="2020-14155"/>
  <issue tracker="cve" id="2019-20838"/>
  <packager>coolo</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for pcre</summary>
  <description>This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)
</description>
</patchinfo>
openSUSE Build Service is sponsored by