{"id":"UBUNTU-CVE-2026-2903","details":"A flaw has been found in skvadrik re2c up to 4.4. Impacted is the function check_and_merge_special_rules of the file src/parse/ast.cc. This manipulation causes null pointer dereference. The attack can only be executed locally. The exploit has been published and may be used. Patch name: febeb977936f9519a25d9fbd10ff8256358cdb97. It is suggested to install a patch to address this issue.","modified":"2026-02-28T06:13:33.902741Z","published":"2026-02-22T01:16:00Z","upstream":["CVE-2026-2903"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-2903"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2026-2903"},{"type":"REPORT","url":"https://github.com/oneafter/0202/blob/main/re/repro"},{"type":"REPORT","url":"https://github.com/skvadrik/re2c/"},{"type":"REPORT","url":"https://github.com/skvadrik/re2c/issues/571#issuecomment-3837675101"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.347210"},{"type":"REPORT","url":"https://vuldb.com/?id.347210"},{"type":"REPORT","url":"https://vuldb.com/?submit.755030"}],"affected":[{"package":{"name":"re2c","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/re2c@3.0-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.0.3-1build1","2.2-1","3.0-1"],"ecosystem_specific":{"binaries":[{"binary_name":"re2c","binary_version":"3.0-1"}],"priority_reason":"This is only a crash is a command-line tool"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2903.json"}},{"package":{"name":"re2c","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/re2c@3.1-1build1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.1-1","3.1-1build1"],"ecosystem_specific":{"binaries":[{"binary_name":"re2c","binary_version":"3.1-1build1"}],"priority_reason":"This is only a crash is a command-line tool"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2903.json"}},{"package":{"name":"re2c","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/re2c@4.3-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.1-1","4.3-2"],"ecosystem_specific":{"binaries":[{"binary_name":"re2c","binary_version":"4.3-2"}],"priority_reason":"This is only a crash is a command-line tool"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2903.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"type":"Ubuntu","score":"low"}]}