First published: Thu Nov 15 2007(Updated: )
From pcre changelog, version 6.7: 26. If a subpattern containing a named recursion or subroutine reference such as (?P>B) was quantified, for example (xxx(?P>B)){3}, the calculation of the space required for the compiled pattern went wrong and gave too small a value. Depending on the environment, this could lead to "Failed: internal error: code overflow at offset 49" or "glibc detected double free or corruption" errors. Acknowledgements: Red Hat would like to thank Ludwig Nussel for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-7226 is classified as a moderate severity vulnerability that could lead to a denial of service.
Fix CVE-2006-7226 by upgrading to a later version of PCRE that addresses this issue.
CVE-2006-7226 affects Red Hat Enterprise Linux 4.0 across various editions including Desktop, AS, ES, and WS.
CVE-2006-7226 is a vulnerability related to improper space calculation for compiled patterns in PCRE.
There are no known active exploits specifically targeting CVE-2006-7226.