Hi,

> the following vulnerability was published for pcre2.
> 
> CVE-2017-8786[0]:
> | pcre2test.c in PCRE2 10.23 allows remote attackers to cause a denial of
> | service (heap-based buffer overflow) or possibly have unspecified other
> | impact via a crafted regular expression.

Upstream have on a number of occasions said that they don't really
consider problems in pcre2test.c a security issue for the library as a
whole.

> The issue is only in the pcre2test utility, so IMHO no immediate
> update is needed. But if you get an unblock from the release team,
> then even better and might already be fixed for stretch.

My inclination is that it's OK for the next upstream pcre2 release which
will contain this fix.

Regards,

Matthew

Reply via email to