CVE-2026-2903
Published: February 26, 2026Last modified: March 2, 2026
Description
A flaw has been found in skvadrik re2c up to 4.4. Impacted is the function check_and_merge_special_rules of the file src/parse/ast.cc. This manipulation causes null pointer dereference. The attack can only be executed locally. The exploit has been published and may be used. Patch name: febeb977936f9519a25d9fbd10ff8256358cdb97. It is suggested to install a patch to address this issue.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 3.3 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | LOW |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | re2c | Not affected (3.0-r0) |
| 25 LTS | re2c | Fixed (4.2-r1) | |
| Stream | re2c | Fixed (4.4-r1) |
References
- https://github.com/oneafter/0202/blob/main/re/repro
- https://github.com/skvadrik/re2c/
- https://github.com/skvadrik/re2c/commit/febeb977936f9519a25d9fbd10ff8256358cdb97
- https://github.com/skvadrik/re2c/issues/571
- https://github.com/skvadrik/re2c/issues/571#issuecomment-3837675101
- https://vuldb.com/?ctiid.347210
- https://vuldb.com/?id.347210
- https://vuldb.com/?submit.755030