{"id":"JLSEC-2026-177","details":"libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.","modified":"2026-04-22T20:39:54.795474Z","published":"2026-04-22T20:20:10.334Z","upstream":["CVE-2020-14155"],"database_specific":{"sources":[{"imported":"2026-04-22T18:38:35.712Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2020-14155","published":"2020-06-15T17:15:10.777Z","id":"CVE-2020-14155","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14155","database_specific":{"status":"Modified"},"modified":"2024-11-21T05:02:45.440Z"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"http://seclists.org/fulldisclosure/2020/Dec/32"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2020/Dec/32"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2021/Feb/14"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2021/Feb/14"},{"type":"WEB","url":"https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"},{"type":"WEB","url":"https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"},{"type":"WEB","url":"https://bugs.gentoo.org/717920"},{"type":"WEB","url":"https://bugs.gentoo.org/717920"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20221028-0010/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20221028-0010/"},{"type":"WEB","url":"https://support.apple.com/kb/HT211931"},{"type":"WEB","url":"https://support.apple.com/kb/HT211931"},{"type":"WEB","url":"https://support.apple.com/kb/HT212147"},{"type":"WEB","url":"https://support.apple.com/kb/HT212147"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"WEB","url":"https://www.pcre.org/original/changelog.txt"},{"type":"WEB","url":"https://www.pcre.org/original/changelog.txt"}],"affected":[{"package":{"name":"Openresty_jll","ecosystem":"Julia","purl":"pkg:julia/Openresty_jll?uuid=87da34d4-7b1b-5a94-8376-8cb65bf3132c"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.21.4+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-177.json"}},{"package":{"name":"PCRE_jll","ecosystem":"Julia","purl":"pkg:julia/PCRE_jll?uuid=2f80f16e-611a-54ab-bc61-aa92de5b98fc"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"8.44.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-177.json"}}],"schema_version":"1.7.5"}