*** This bug is a security vulnerability ***

Public security bug reported:

CVE-2008-2371 description from Debian security advisory DSA-1602-1:

"Tavis Ormandy discovered that PCRE, the Perl-Compatible Regular
Expression library, may encounter a heap overflow condition when
compiling certain regular expressions involving in-pattern options and
branches, potentially leading to arbitrary code execution."

http://www.debian.org/security/2008/dsa-1602

** Affects: pcre3 (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: pcre3 (Debian)
     Importance: Unknown
         Status: Unknown

** Visibility changed to: Public

** Bug watch added: Debian Bug tracker #488919
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919

** Also affects: pcre3 (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919
   Importance: Unknown
       Status: Unknown

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-2371

-- 
[CVE-2008-2371] Heap overflow in PCRE leading to arbitrary code execution
https://bugs.launchpad.net/bugs/245934
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to