Dear all,
A relatively small security issue has been reported in PCRE2. It is a read-past-the-end memory error, of arbitrary length. An attacker-controlled regex pattern is required, and it cannot be triggered by providing crafted subject (match) text.
This could have implications of denial-of-service or information disclosure, and could potentially be used to escalate other vulnerabilities in a system (such as information disclosure being used to escalate the severity of an unrelated bug in another system).
I have decided to release the fix without waiting for our next scheduled release.
The 10.46 release will contain only the three-line code change necessary to fix the bug. I would recommend that users update from 10.45 to 10.46 at their earliest convenience.
I will request a CVE.
This bug report is credited to the Google Big Sleep project (many thanks).
With my apologies,
Nick Wilson