First published: Fri Nov 09 2007(Updated: )
PCRE is a Perl-compatible regular expression library.<br>Flaws were found in the way PCRE handles certain malformed regular<br>expressions. If an application linked against PCRE, such as Konqueror,<br>parses a malicious regular expression, it may be possible to run arbitrary<br>code as the user running the application. (CVE-2005-4872, CVE-2006-7227)<br>Users of PCRE are advised to upgrade to these updated packages, which<br>contain a backported patch to correct these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre | <6.6-2.el5_1.1 | 6.6-2.el5_1.1 |
redhat/pcre | <6.6-2.el5_1.1 | 6.6-2.el5_1.1 |
redhat/pcre-devel | <6.6-2.el5_1.1 | 6.6-2.el5_1.1 |
redhat/pcre-devel | <6.6-2.el5_1.1 | 6.6-2.el5_1.1 |
redhat/pcre | <4.5-4.el4_5.4 | 4.5-4.el4_5.4 |
redhat/pcre | <4.5-4.el4_5.4 | 4.5-4.el4_5.4 |
redhat/pcre-devel | <4.5-4.el4_5.4 | 4.5-4.el4_5.4 |
redhat/pcre-devel | <4.5-4.el4_5.4 | 4.5-4.el4_5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2007:1052 is classified as important.
To fix RHSA-2007:1052, upgrade the affected pcre or pcre-devel packages to version 6.6-2.el5_1.1 or 4.5-4.el4_5.4 depending on your system.
RHSA-2007:1052 addresses flaws in PCRE that can lead to arbitrary code execution when processing malformed regular expressions.
Applications linked against the PCRE library, such as Konqueror, may be affected by the vulnerabilities described in RHSA-2007:1052.
There is no specific workaround for RHSA-2007:1052; the recommended action is to apply the necessary updates.