FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2025-10-10 08:58:57 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
7033b42d-ef09-11e5-b766-14dae9d210b8pcre -- stack buffer overflow

Philip Hazel reports:

PCRE does not validate that handling the (*ACCEPT) verb will occur within the bounds of the cworkspace stack buffer, leading to a stack buffer overflow.


Discovery 2016-02-09
Entry 2016-03-21
Modified 2016-03-21
pcre
< 8.38

pcre2
< 10.20_1

https://bugs.exim.org/show_bug.cgi?id=1791
CVE-2016-3191
b51a4121-9607-11f0-becf-00a098b42aebPCRE2: heap-buffer-overflow read in match_ref due to missing boundary restoration in SCS

security-advisories@github.com reports:

The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker.


Discovery 2025-08-27
Entry 2025-09-20
pcre2
= 10.45

CVE-2025-58050
https://nvd.nist.gov/vuln/detail/CVE-2025-58050