[Bug 1037048] New: VUL-0: CVE-2017-8399: pcre2: stack-based buffer overflow in pcre2_match.c (elated to a "pattern with very many captures.")

http://bugzilla.opensuse.org/show_bug.cgi?id=1037048 Bug ID: 1037048 Summary: VUL-0: CVE-2017-8399: pcre2: stack-based buffer overflow in pcre2_match.c (elated to a "pattern with very many captures.") Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: mikhail.kasimov@gmail.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-8399 =================================================== Description PCRE2 before 2017-03-10 has an out-of-bounds write caused by a stack-based buffer overflow in pcre2_match.c, related to a "pattern with very many captures." Source: MITRE Last Modified: 05/01/2017 =================================================== Hyperlink [1] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=783 [2] https://vcs.pcre.org/pcre2?view=revision&revision=674 (open-)SUSE: https://software.opensuse.org/package/pcre2 10.23 (TW, official repo) 10.22 (42.{1,2}, official repo) -- You are receiving this mail because: You are on the CC list for the bug.

http://bugzilla.opensuse.org/show_bug.cgi?id=1037048 Mikhail Kasimov <mikhail.kasimov@gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Alias| |CVE-2017-8399 -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com