First published: Thu Nov 29 2007(Updated: )
PCRE is a Perl-compatible regular expression library.<br>Flaws were discovered in the way PCRE handles certain malformed regular<br>expressions. If an application linked against PCRE, such as Konqueror,<br>parses a malicious regular expression, it may have been possible to run<br>arbitrary code as the user running the application.<br>(CVE-2006-7225, CVE-2006-7226, CVE-2006-7228, CVE-2006-7230)<br>Users of PCRE are advised to upgrade to these updated packages, which<br>contain backported patches to resolve these issues.<br>Red Hat would like to thank Ludwig Nussel for reporting these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre | <6.6-2.el5_1.7 | 6.6-2.el5_1.7 |
redhat/pcre | <6.6-2.el5_1.7 | 6.6-2.el5_1.7 |
redhat/pcre-devel | <6.6-2.el5_1.7 | 6.6-2.el5_1.7 |
redhat/pcre-devel | <6.6-2.el5_1.7 | 6.6-2.el5_1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2007:1059 is considered important due to the potential for remote code execution vulnerabilities.
To fix RHSA-2007:1059, you should update to the fixed version of the affected packages, specifically pcre and pcre-devel to version 6.6-2.el5_1.7.
RHSA-2007:1059 affects the PCRE library in versions prior to 6.6-2.el5_1.7.
Applications linked against the vulnerable PCRE library, such as Konqueror, may exploit the vulnerabilities described in RHSA-2007:1059.
A workaround for RHSA-2007:1059 would involve not using the PCRE library until a secure version is applied.