CVE-2017-8399 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8399): PCRE2 before 2017-03-10 has an out-of-bounds write caused by a stack-based buffer overflow in pcre2_match.c, related to a "pattern with very many captures."
This is B2 beucase of a write issue
Upstream patch: https://vcs.pcre.org/pcre2?view=revision&revision=674
Fix released in dev-libs/libpcre2-10.30.
@ Arches, please test and mark stable: =dev-libs/libpcre2-10.30
x86 stable
ia64 stable
arm stable
amd64 stable
alpha stable
sparc was dropped to exp. https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=b5901d8f716555a1479f12313a2925fcadd177a9
New GLSA Application filed. @ppc, please finish stabilization, this stabilization request has been opened since a month ago. Thank you, Gentoo Security Padawan ChrisADR
ppc64 stable
ppc stable
This issue was resolved and addressed in GLSA 201710-09 at https://security.gentoo.org/glsa/201710-09 by GLSA coordinator Aaron Bauman (b-man).
re-opened for cleanup.
sparc stable (thanks to Rolf Eike Beer)
cleanup done. Thank you all