Source: pcre2
Version: 10.22-3
Severity: minor
Tags: security upstream patch
Forwarded: https://bugs.exim.org/show_bug.cgi?id=2079

Hi,

the following vulnerability was published for pcre2.

CVE-2017-8786[0]:
| pcre2test.c in PCRE2 10.23 allows remote attackers to cause a denial of
| service (heap-based buffer overflow) or possibly have unspecified other
| impact via a crafted regular expression.

The issue is only in the pcre2test utility, so IMHO no immediate
update is needed. But if you get an unblock from the release team,
then even better and might already be fixed for stretch.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-8786
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8786
[1] https://bugs.exim.org/show_bug.cgi?id=2079

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to