File _patchinfo of Package patchinfo.21543
<patchinfo incident="21543">
<issue tracker="bnc" id="1172974">VUL-1: CVE-2020-14155: pcre: libpcre allows an integer overflow via a large number after a (?C substring</issue>
<issue tracker="bnc" id="1172973">VUL-1: CVE-2019-20838: pcre: libpcre allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier</issue>
<issue tracker="cve" id="2020-14155"/>
<issue tracker="cve" id="2019-20838"/>
<packager>coolo</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for pcre</summary>
<description>This update for pcre fixes the following issues:
Update pcre to version 8.45:
- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)
</description>
</patchinfo>