File tree Expand file tree Collapse file tree 3 files changed +21
-8
lines changed Expand file tree Collapse file tree 3 files changed +21
-8
lines changed Original file line number Diff line number Diff line change @@ -10,9 +10,9 @@ listed here.
10
10
Version 10.46 27-August-2025
11
11
----------------------------
12
12
13
- 1. (#771) Security fix to prevent a read-past-the-end memory error, of
14
- arbitrary length. An attacker-controlled regex pattern is required, and it
15
- cannot be triggered by providing crafted subject (match) text. The
13
+ 1. (#771) (CVE-2025-58050) Security fix to prevent a read-past-the-end memory
14
+ error, of arbitrary length. An attacker-controlled regex pattern is required,
15
+ and it cannot be triggered by providing crafted subject (match) text. The
16
16
(*ACCEPT) and (*scs:) pattern features must be used together.
17
17
18
18
Release 10.44 and earlier are not affected.
Original file line number Diff line number Diff line change @@ -4,7 +4,9 @@ News about PCRE2 releases
4
4
Version 10.46 27-August-2025
5
5
----------------------------
6
6
7
- This is a security-only release, with only a minimal code change to prevent a
7
+ This is a security-only release, to address CVE-2025-58050.
8
+
9
+ Compared to 10.45, this release has only a minimal code change to prevent a
8
10
read-past-the-end memory error, of arbitrary length. An attacker-controlled
9
11
regex pattern is required, and it cannot be triggered by providing crafted
10
12
subject (match) text. The (*ACCEPT) and (*scs:) pattern features must be used
Original file line number Diff line number Diff line change @@ -20,6 +20,11 @@ Git checkout of the (GPG-signed) release tag.
20
20
Please contact the maintainers for any queries about release integrity or the
21
21
project's supply-chain.
22
22
23
+ ## Previous vulnerabilities
24
+
25
+ * CVE-2025 -58050 (August 2025). Affects 10.45 only (not earlier), and is fixed
26
+ in 10.46.
27
+
23
28
## Reporting vulnerabilities
24
29
25
30
The PCRE2 project prioritises security. We appreciate third-party testing and
@@ -38,7 +43,13 @@ aim to respond within 1 week, or perhaps 2 during holidays.
38
43
39
44
### Response procedure
40
45
41
- PCRE2 has never previously made a rapid or embargoed release in response to a
42
- security incident. We would work with security managers from trusted downstream
43
- distributors, such as major Linux distributions, before disclosing the
44
- vulnerability publicly.
46
+ PCRE2 has in the past made at least one rapid release in response to
47
+ security incidents.
48
+
49
+ We have never produced an embargoed release, or provided preferential
50
+ access to security fixes to any clients.
51
+
52
+ We would aim to notify security managers from trusted downstream distributors,
53
+ such as major Linux distributions, via the ` pcre2-dev ` mailing list, by
54
+ publicly signalling an upcoming security release before disclosing the
55
+ vulnerability publicly, where advance notification is possible.
You can’t perform that action at this time.
0 commit comments