{"id":"CVE-2025-58050","summary":"PCRE2: heap-buffer-overflow read in match_ref due to missing boundary restoration in SCS","details":"The PCRE2 library is a set of C functions that implement regular expression pattern matching. In version 10.45, a heap-buffer-overflow read vulnerability exists in the PCRE2 regular expression matching engine, specifically within the handling of the (*scs:...) (Scan SubString) verb when combined with (*ACCEPT) in src/pcre2_match.c. This vulnerability may potentially lead to information disclosure if the out-of-bounds data read during the memcmp affects the final match result in a way observable by the attacker. This issue has been resolved in version 10.46.","aliases":["GHSA-c2gv-xgf5-5cc2"],"modified":"2026-04-11T02:28:05.366275Z","published":"2025-08-27T18:47:35.041Z","related":["openSUSE-SU-2025:15501-1"],"database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58050.json","cwe_ids":["CWE-122","CWE-125"]},"references":[{"type":"WEB","url":"https://github.com/PCRE2Project/pcre2/releases/tag/pcre2-10.46"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58050.json"},{"type":"ADVISORY","url":"https://github.com/PCRE2Project/pcre2/security/advisories/GHSA-c2gv-xgf5-5cc2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58050"},{"type":"FIX","url":"https://github.com/PCRE2Project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pcre2project/pcre2","events":[{"introduced":"0"},{"fixed":"a141712e5967d448c7ce13090ab530c8e3d82254"}]}],"versions":["pcre2-10.38","pcre2-10.38-RC1","pcre2-10.39","pcre2-10.40","pcre2-10.41","pcre2-10.42","pcre2-10.43","pcre2-10.43-RC1","pcre2-10.44","pcre2-10.45"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58050.json","vanir_signatures":[{"source":"https://github.com/pcre2project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254","deprecated":false,"target":{"file":"src/pcre2_match.c"},"id":"CVE-2025-58050-01faf4fa","digest":{"line_hashes":["97874913069314297822922026659519884128","125344604230288086545355898967879485183","295312349831834939820016000040301121058","152484683899926719584038087808047164426"],"threshold":0.9},"signature_version":"v1","signature_type":"Line"},{"source":"https://github.com/pcre2project/pcre2/commit/a141712e5967d448c7ce13090ab530c8e3d82254","deprecated":false,"target":{"file":"src/pcre2_match.c","function":"match"},"id":"CVE-2025-58050-334a70e8","digest":{"length":103016,"function_hash":"76962601304507413989015398055719776209"},"signature_version":"v1","signature_type":"Function"}],"vanir_signatures_modified":"2026-04-11T02:28:05Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:L/SI:N/SA:L"}]}