*** This bug is a security vulnerability *** Public security bug reported:
CVE-2008-2371 description from Debian security advisory DSA-1602-1: "Tavis Ormandy discovered that PCRE, the Perl-Compatible Regular Expression library, may encounter a heap overflow condition when compiling certain regular expressions involving in-pattern options and branches, potentially leading to arbitrary code execution." http://www.debian.org/security/2008/dsa-1602 ** Affects: pcre3 (Ubuntu) Importance: Undecided Status: New ** Affects: pcre3 (Debian) Importance: Unknown Status: Unknown ** Visibility changed to: Public ** Bug watch added: Debian Bug tracker #488919 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919 ** Also affects: pcre3 (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919 Importance: Unknown Status: Unknown ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2371 -- [CVE-2008-2371] Heap overflow in PCRE leading to arbitrary code execution https://bugs.launchpad.net/bugs/245934 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
