Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2025-58050

Published: August 29, 2025Last modified: September 1, 2025

Description

The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.

Severity score breakdown

ParameterValue
Base score9.1
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactNONE
Availability impactHIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSpcre2Not affected (10.42-r0)
25 LTSpcre2Not affected (10.43-r1)
Streampcre2Fixed (10.46-r0)
Hardened Containers23 LTSpcre2Not affected (10.42-r0)
Streampcre2Fixed (10.46-r0)

References

ON THIS PAGE