{"id":"UBUNTU-CVE-2017-8399","details":"PCRE2 before 10.30 has an out-of-bounds write caused by a stack-based buffer overflow in pcre2_match.c, related to a \"pattern with very many captures.\"","modified":"2025-07-16T07:18:31.637471Z","published":"2017-05-01T18:59:00Z","withdrawn":"2025-07-18T16:43:58Z","upstream":["CVE-2017-8399"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8399"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-8399"}],"affected":[{"package":{"name":"pcre2","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/pcre2@10.21-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.21-1"}]}],"versions":["10.20-1","10.20-2","10.20-3"],"ecosystem_specific":{"binaries":[{"binary_name":"libpcre2-16-0","binary_version":"10.21-1"},{"binary_name":"libpcre2-16-0-dbgsym","binary_version":"10.21-1"},{"binary_name":"libpcre2-32-0","binary_version":"10.21-1"},{"binary_name":"libpcre2-32-0-dbgsym","binary_version":"10.21-1"},{"binary_name":"libpcre2-8-0","binary_version":"10.21-1"},{"binary_name":"libpcre2-8-0-dbgsym","binary_version":"10.21-1"},{"binary_name":"libpcre2-dbg","binary_version":"10.21-1"},{"binary_name":"libpcre2-dev","binary_version":"10.21-1"},{"binary_name":"libpcre2-dev-dbgsym","binary_version":"10.21-1"},{"binary_name":"libpcre2-posix0","binary_version":"10.21-1"},{"binary_name":"libpcre2-posix0-dbgsym","binary_version":"10.21-1"},{"binary_name":"pcre2-utils","binary_version":"10.21-1"},{"binary_name":"pcre2-utils-dbgsym","binary_version":"10.21-1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-8399.json"}},{"package":{"name":"pcre2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/pcre2@10.31-2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.31-2"}]}],"versions":["10.22-3","10.22-4","10.22-5","10.22-6"],"ecosystem_specific":{"binaries":[{"binary_name":"libpcre2-16-0","binary_version":"10.31-2"},{"binary_name":"libpcre2-32-0","binary_version":"10.31-2"},{"binary_name":"libpcre2-8-0","binary_version":"10.31-2"},{"binary_name":"libpcre2-8-0-udeb","binary_version":"10.31-2"},{"binary_name":"libpcre2-dbg","binary_version":"10.31-2"},{"binary_name":"libpcre2-dev","binary_version":"10.31-2"},{"binary_name":"libpcre2-posix0","binary_version":"10.31-2"},{"binary_name":"pcre2-utils","binary_version":"10.31-2"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-8399.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}