Skip to content

Commit b2bd425

Browse files
authored
Added number for CVE-2025-58050
1 parent a141712 commit b2bd425

File tree

3 files changed

+21
-8
lines changed

3 files changed

+21
-8
lines changed

ChangeLog

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ listed here.
1010
Version 10.46 27-August-2025
1111
----------------------------
1212

13-
1. (#771) Security fix to prevent a read-past-the-end memory error, of
14-
arbitrary length. An attacker-controlled regex pattern is required, and it
15-
cannot be triggered by providing crafted subject (match) text. The
13+
1. (#771) (CVE-2025-58050) Security fix to prevent a read-past-the-end memory
14+
error, of arbitrary length. An attacker-controlled regex pattern is required,
15+
and it cannot be triggered by providing crafted subject (match) text. The
1616
(*ACCEPT) and (*scs:) pattern features must be used together.
1717

1818
Release 10.44 and earlier are not affected.

NEWS

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,9 @@ News about PCRE2 releases
44
Version 10.46 27-August-2025
55
----------------------------
66

7-
This is a security-only release, with only a minimal code change to prevent a
7+
This is a security-only release, to address CVE-2025-58050.
8+
9+
Compared to 10.45, this release has only a minimal code change to prevent a
810
read-past-the-end memory error, of arbitrary length. An attacker-controlled
911
regex pattern is required, and it cannot be triggered by providing crafted
1012
subject (match) text. The (*ACCEPT) and (*scs:) pattern features must be used

SECURITY.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,11 @@ Git checkout of the (GPG-signed) release tag.
2020
Please contact the maintainers for any queries about release integrity or the
2121
project's supply-chain.
2222

23+
## Previous vulnerabilities
24+
25+
* CVE-2025-58050 (August 2025). Affects 10.45 only (not earlier), and is fixed
26+
in 10.46.
27+
2328
## Reporting vulnerabilities
2429

2530
The PCRE2 project prioritises security. We appreciate third-party testing and
@@ -38,7 +43,13 @@ aim to respond within 1 week, or perhaps 2 during holidays.
3843

3944
### Response procedure
4045

41-
PCRE2 has never previously made a rapid or embargoed release in response to a
42-
security incident. We would work with security managers from trusted downstream
43-
distributors, such as major Linux distributions, before disclosing the
44-
vulnerability publicly.
46+
PCRE2 has in the past made at least one rapid release in response to
47+
security incidents.
48+
49+
We have never produced an embargoed release, or provided preferential
50+
access to security fixes to any clients.
51+
52+
We would aim to notify security managers from trusted downstream distributors,
53+
such as major Linux distributions, via the `pcre2-dev` mailing list, by
54+
publicly signalling an upcoming security release before disclosing the
55+
vulnerability publicly, where advance notification is possible.

0 commit comments

Comments
 (0)