package: src:pcre2
version: 10.45-1
tags: security upstream trixie forky

PCRE upstream released 10.46 yesterday to fix CVE-2025-58050 - https://github.com/PCRE2Project/pcre2/releases/tag/pcre2-10.46

Quoting the release note:

"
This is a security-only release, to address CVE-2025-58050.

Compared to 10.45, this release has only a minimal code change to prevent a read-past-the-end memory error, of arbitrary length. An attacker-controlled regex pattern is required, and it cannot be triggered by providing crafted subject (match) text. The (*ACCEPT) and (*scs:) pattern features must be used together.

Release 10.44 and earlier are not affected.

This could have implications of denial-of-service or information disclosure, and could potentially be used to escalate other vulnerabilities in a system (such as information disclosure being used to escalate the severity of an unrelated bug in another system).
"

So trixie (10.45-1) and forky/unstable are vulnerable, but not older releases.

Regards,

Matthew

Reply via email to