CVE-2020-14155

Source
https://cve.org/CVERecord?id=CVE-2020-14155
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14155.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-14155
Aliases
Downstream
Related
Published
2020-06-15T17:15:10.777Z
Modified
2026-05-18T05:50:53.749190016Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "11.0.1"
                }
            ],
            "cpes": [
                "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
            ],
            "vendor_product": "apple:macos"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "1.15.0"
                }
            ],
            "vendor_product": "oracle:communications_cloud_native_core_policy"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "fixed": "8.44"
                }
            ],
            "vendor_product": "pcre:pcre"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "introduced": "8.2.0"
                },
                {
                    "fixed": "8.2.12"
                },
                {
                    "introduced": "9.0.0"
                },
                {
                    "fixed": "9.0.6"
                },
                {
                    "last_affected": "9.1.0"
                }
            ],
            "cpes": [
                "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
                "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "splunk:universal_forwarder"
        }
    ]
}
References

Affected packages

Git / gitlab.com/gitlab-org/gitlab

Affected ranges

Type
GIT
Repo
https://gitlab.com/gitlab-org/gitlab
Events
Database specific
{
    "cpe": [
        "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
        "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
    ],
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "12.10.13"
        },
        {
            "introduced": "13.0.0"
        },
        {
            "fixed": "13.0.8"
        },
        {
            "introduced": "13.1.0"
        },
        {
            "fixed": "13.1.2"
        }
    ]
}

Affected versions

Other
11-10-0cfa69752d8-0d9531c80-ee
11-10-0cfa69752d8-74ffd66ae-ee
11-10-119f9509d50-6d7537235-ee
v1.*
v1.2.0
v1.2.0pre
v1.2.1
v1.2.2
v12.*
v12.10.0-ee
v12.10.0-rc20200415152739-ee
v12.10.0-rc42-ee
v12.10.0-rc43-ee
v12.10.0-rc44-ee
v12.10.1-ee
v12.10.10-ee
v12.10.12-ee
v12.10.3-ee
v12.10.4-ee
v12.10.5-ee
v12.10.6-ee
v12.10.8-ee
v13.*
v13.0.0-ee
v13.0.2-ee
v13.0.3-ee
v13.0.5-ee
v13.0.7-ee
v13.1.0-ee
v13.1.1-ee
v2.*
v2.3.0
v2.3.0pre
v2.3.1
v2.4.0
v2.4.0pre
v2.4.1
v2.5.0
v2.6.0
v2.6.0pre
v2.6.1
v2.6.2
v2.6.3
v2.7.0
v2.7.0pre
v2.8.0
v2.8.0pre
v2.8.1
v2.8.2
v2.9.0
v2.9.1
v3.*
v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.1.0
v4.*
v4.0.0
v4.0.0rc1
v4.0.0rc2
v5.*
v5.0.0
v5.1.0
v5.2.0
v6.*
v6.0.0-ee
v6.0.0-ee.beta
v6.0.0-ee.rc1
v6.1.0-ee
v6.3.0-ee
v6.3.1-ee
v6.4.0-ee
v6.5.0-ee
v6.6.0-ee
v6.7.0-ee
v6.7.0.rc1-ee
v6.8.0-ee
v7.*
v7.0.0-ee
v7.1.0-ee
v7.1.0.rc1-ee
v7.2.0.rc1-ee
v7.2.0.rc2-ee
v7.2.0.rc3-ee
v7.2.0.rc4-ee
v7.2.0.rc5-ee
v7.3.0-ee
v7.3.0.rc1-ee

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14155.json"