Unrated severityNVD Advisory· Published Jun 15, 2020· Updated Aug 4, 2024
CVE-2020-14155
CVE-2020-14155
Description
libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
Affected products
50- PCRE/libpcredescription
- osv-coords49 versionspkg:apk/chainguard/gitlab-operatorpkg:apk/chainguard/gitlab-operator-chartspkg:apk/chainguard/gitlab-operator-compatpkg:apk/chainguard/gitlab-operator-fipspkg:bitnami/gitlabpkg:rpm/almalinux/pcrepkg:rpm/almalinux/pcre-cpppkg:rpm/almalinux/pcre-develpkg:rpm/almalinux/pcre-staticpkg:rpm/almalinux/pcre-utf16pkg:rpm/almalinux/pcre-utf32pkg:rpm/opensuse/pcre&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/pcre&distro=openSUSE%20Leap%2015.3pkg:rpm/suse/pcre&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP4pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Micro%205.0pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/pcre&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/pcre&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/pcre&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/pcre&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/pcre&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/selinux-policy&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/selinux-policy&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/selinux-policy&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/selinux-policy&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/selinux-policy&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/selinux-policy&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/selinux-policy&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/selinux-policy&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/selinux-policy&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/selinux-policy&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/selinux-policy&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/selinux-policy&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/selinux-policy&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/selinux-policy&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 0+ 48 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 12.10.13
- (no CPE)range: < 8.42-6.el8
- (no CPE)range: < 8.42-6.el8
- (no CPE)range: < 8.42-6.el8
- (no CPE)range: < 8.42-6.el8
- (no CPE)range: < 8.42-6.el8
- (no CPE)range: < 8.42-6.el8
- (no CPE)range: < 8.45-lp152.7.6.1
- (no CPE)range: < 8.45-20.10.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-20.10.1
- (no CPE)range: < 8.45-20.10.1
- (no CPE)range: < 8.45-20.10.1
- (no CPE)range: < 8.45-20.10.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 8.45-8.7.1
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
- (no CPE)range: < 20140730-36.5.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- seclists.org/fulldisclosure/2020/Dec/32mitremailing-list
- seclists.org/fulldisclosure/2021/Feb/14mitremailing-list
- lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3Emitremailing-list
- about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/mitre
- bugs.gentoo.org/717920mitre
- security.netapp.com/advisory/ntap-20221028-0010/mitre
- support.apple.com/kb/HT211931mitre
- support.apple.com/kb/HT212147mitre
- www.oracle.com/security-alerts/cpuapr2022.htmlmitre
- www.pcre.org/original/changelog.txtmitre
News mentions
0No linked articles in our index yet.