[pcre3] several security issues in Perl-Compatible Regular Expression library
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
pcre3 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Dapper |
Fix Released
|
Medium
|
Kees Cook | ||
Edgy |
Fix Released
|
Medium
|
Kees Cook | ||
Feisty |
Fix Released
|
Medium
|
Kees Cook | ||
Gutsy |
Fix Released
|
Medium
|
Kees Cook | ||
Hardy |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
References:
[1] http://
[2] https:/
[3] http://
From [1]:
"Tavis Ormandy of the Google Security Team has discovered several security issues in PCRE, the Perl-Compatible Regular Expression library, which potentially allow attackers to execute arbitrary code by compiling specially crafted regular expressions."
Especially noteworthy from [1]:
"Version 7.0 of the PCRE library featured a major rewrite of the regular expression compiler, and it was deemed infeasible to backport the security fixes in version 7.3 to the versions in Debian's stable and oldstable distributions (6.7 and 4.5, respectively). Therefore, this update contains version 7.3, with special patches to improve the compatibility with the older versions. As a result, extra care is necessary when applying this update."
Changed in pcre3: | |
assignee: | nobody → keescook |
importance: | Undecided → Medium |
status: | New → In Progress |
assignee: | nobody → keescook |
importance: | Undecided → Medium |
status: | New → In Progress |
assignee: | nobody → keescook |
importance: | Undecided → Medium |
status: | New → In Progress |
assignee: | nobody → keescook |
importance: | Undecided → Medium |
status: | New → In Progress |
I'm sorry and guess that this bug shouldn't point to CVE-2007-5116.
See also Bug #160693 .