{"id":"CVE-2025-58050","summary":"PCRE2: heap-buffer-overflow read in match_ref due to missing boundary restoration in SCS","details":"The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.","aliases":["GHSA-c2gv-xgf5-5cc2"],"modified":"2026-04-17T18:29:22.534896142Z","published":"2025-08-27T18:47:35.041Z","related":["SUSE-SU-2026:21094-1","openSUSE-SU-2025:15501-1"],"database_specific":{"cwe_ids":["CWE-122","CWE-125"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58050.json"},"references":[{"type":"WEB","url":"https://github.com/PCRE2Project/pcre2/releases/tag/pcre2-10.46"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58050.json"},{"type":"ADVISORY","url":"https://github.com/PCRE2Project/pcre2/security/advisories/GHSA-c2gv-xgf5-5cc2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58050"},{"type":"FIX","url":"https://github.com/PCRE2Project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pcre2project/pcre2","events":[{"introduced":"0"},{"fixed":"a141712e5967d448c7ce13090ab530c8e3d82254"}]}],"versions":["pcre2-10.38","pcre2-10.38-RC1","pcre2-10.39","pcre2-10.40","pcre2-10.41","pcre2-10.42","pcre2-10.43","pcre2-10.43-RC1","pcre2-10.44","pcre2-10.45"],"database_specific":{"vanir_signatures_modified":"2026-04-12T18:25:20Z","vanir_signatures":[{"signature_version":"v1","target":{"file":"src/pcre2_match.c"},"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["97874913069314297822922026659519884128","125344604230288086545355898967879485183","295312349831834939820016000040301121058","152484683899926719584038087808047164426"]},"id":"CVE-2025-58050-01faf4fa","source":"https://github.com/pcre2project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254","deprecated":false},{"signature_version":"v1","target":{"function":"match","file":"src/pcre2_match.c"},"signature_type":"Function","digest":{"length":103016,"function_hash":"76962601304507413989015398055719776209"},"id":"CVE-2025-58050-334a70e8","source":"https://github.com/pcre2project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254","deprecated":false}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-58050.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:L/SI:N/SA:L"}]}