Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2903: NULL Pointer Dereference in skvadrik re2c

0
Medium
VulnerabilityCVE-2026-2903cvecve-2026-2903
Published: Sun Feb 22 2026 (02/22/2026, 00:32:09 UTC)
Source: CVE Database V5
Vendor/Project: skvadrik
Product: re2c

Description

CVE-2026-2903 is a medium severity vulnerability in skvadrik re2c versions up to 4. 4, caused by a null pointer dereference in the function check_and_merge_special_rules within src/parse/ast. cc. This flaw can be triggered only by a local attacker with low privileges and does not require user interaction or network access. Exploitation results in a denial of service due to application crash but does not compromise confidentiality or integrity. A patch has been released to address the issue. Organizations using re2c should apply the patch promptly to prevent local denial of service conditions. The vulnerability has a CVSS score of 4. 8, reflecting limited impact and exploitation scope. Countries with significant software development and open-source usage, such as the United States, Germany, and Japan, may be more affected due to higher adoption of re2c in development environments.

AI-Powered Analysis

AILast updated: 02/22/2026, 01:16:42 UTC

Technical Analysis

CVE-2026-2903 identifies a null pointer dereference vulnerability in the open-source tool skvadrik re2c, specifically affecting versions 4.0 through 4.4. The flaw resides in the function check_and_merge_special_rules located in src/parse/ast.cc, where improper handling of certain inputs leads to dereferencing a null pointer. This results in a crash of the re2c process, causing a denial of service. The vulnerability requires local access with low privileges, meaning an attacker must have some level of access to the host system to exploit it. No authentication or user interaction is necessary beyond local presence. The vulnerability does not affect confidentiality or integrity, as it only causes a process crash without code execution or data leakage. The exploit has been publicly disclosed, increasing the risk of local denial of service attacks. A patch identified by commit febeb977936f9519a25d9fbd10ff8256358cdb97 has been released to fix the issue. The CVSS v4.0 base score is 4.8, reflecting a medium severity level due to the limited attack vector (local), low complexity, and no privilege escalation or network exploitation. The vulnerability is relevant primarily to developers and organizations using re2c for lexer generation in software projects.

Potential Impact

The primary impact of CVE-2026-2903 is a denial of service condition caused by a null pointer dereference crash in re2c. This can disrupt development workflows or automated build systems relying on re2c, potentially delaying software releases or automated testing. Since exploitation requires local access, the threat is mostly relevant in multi-user environments, shared development servers, or compromised systems where an attacker has gained limited access. There is no direct risk to data confidentiality or integrity, nor is there evidence of privilege escalation or remote exploitation. However, denial of service in critical build or CI/CD environments could indirectly impact organizational productivity and operational continuity. The public availability of an exploit increases the likelihood of opportunistic attacks in environments where re2c is used without patching. Overall, the impact is moderate and mostly operational rather than security-critical.

Mitigation Recommendations

To mitigate CVE-2026-2903, organizations should promptly apply the official patch identified by commit febeb977936f9519a25d9fbd10ff8256358cdb97 to all affected re2c installations (versions 4.0 through 4.4). In addition, restrict local access to systems running re2c to trusted users only, minimizing the risk of local exploitation. Implement strict user privilege separation and monitor local user activities for suspicious behavior. For build servers and CI/CD pipelines using re2c, consider isolating build environments and employing containerization to limit the impact of potential crashes. Regularly update development tools and dependencies to incorporate security fixes. Finally, maintain an inventory of software development tools to quickly identify and remediate vulnerable versions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T20:02:38.891Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a5593be58cf853b7fcba7

Added to database: 2/22/2026, 1:02:11 AM

Last enriched: 2/22/2026, 1:16:42 AM

Last updated: 2/22/2026, 6:29:29 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats