{"affected":[{"ecosystem_specific":{"binaries":[{"libpcre1":"8.45-20.10.1","libpcre1-32bit":"8.45-20.10.1","libpcre16-0":"8.45-20.10.1","libpcre16-0-32bit":"8.45-20.10.1","libpcrecpp0":"8.45-20.10.1","libpcrecpp0-32bit":"8.45-20.10.1","libpcreposix0":"8.45-20.10.1","libpcreposix0-32bit":"8.45-20.10.1","pcre-devel":"8.45-20.10.1","pcre-devel-static":"8.45-20.10.1","pcre-doc":"8.45-20.10.1","pcre-tools":"8.45-20.10.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"pcre","purl":"pkg:rpm/opensuse/pcre&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.45-20.10.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for pcre fixes the following issues:\n\nUpdate pcre to version 8.45:\n\n- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).\n- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)\n","id":"openSUSE-SU-2021:3529-1","modified":"2021-10-27T07:23:54Z","published":"2021-10-27T07:23:54Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-20838"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14155"}],"related":["CVE-2019-20838","CVE-2020-14155"],"summary":"Security update for pcre","upstream":["CVE-2019-20838","CVE-2020-14155"]}