Mailinglist Archive: opensuse-bugs (4292 mails)

< Previous Next >
[Bug 1037048] New: VUL-0: CVE-2017-8399: pcre2: stack-based buffer overflow in pcre2_match.c (elated to a "pattern with very many captures.")
  • From: bugzilla_noreply@xxxxxxxxxx
  • Date: Mon, 01 May 2017 21:40:29 +0000
  • Message-id: <bug-1037048-21960@http.bugzilla.opensuse.org/>
http://bugzilla.opensuse.org/show_bug.cgi?id=1037048


Bug ID: 1037048
Summary: VUL-0: CVE-2017-8399: pcre2: stack-based buffer
overflow in pcre2_match.c (elated to a "pattern with
very many captures.")
Classification: openSUSE
Product: openSUSE Distribution
Version: Leap 42.2
Hardware: Other
OS: Other
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Security
Assignee: security-team@xxxxxxx
Reporter: mikhail.kasimov@xxxxxxxxx
QA Contact: qa-bugs@xxxxxxx
Found By: ---
Blocker: ---

Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-8399
===================================================
Description

PCRE2 before 2017-03-10 has an out-of-bounds write caused by a stack-based
buffer overflow in pcre2_match.c, related to a "pattern with very many
captures."

Source: MITRE Last Modified: 05/01/2017
===================================================

Hyperlink

[1] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=783

[2] https://vcs.pcre.org/pcre2?view=revision&revision=674


(open-)SUSE: https://software.opensuse.org/package/pcre2

10.23 (TW, official repo)
10.22 (42.{1,2}, official repo)

--
You are receiving this mail because:
You are on the CC list for the bug.
< Previous Next >
Follow Ups