SCIENTIFIC-LINUX-ERRATA Archives

November 2007

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
Security Errata for Scientific Linux <[log in to unmask]>
Date:
Tue, 6 Nov 2007 08:08:10 -0600
MIME-version:
1.0
Reply-To:
Troy Dawson <[log in to unmask]>
Content-type:
text/plain; format=flowed; charset=ISO-8859-1
Subject:
From:
Troy Dawson <[log in to unmask]>
Content-transfer-encoding:
7BIT
Comments:
Parts/Attachments:
text/plain (38 lines)
Synopsis:	Critical: pcre security update
Issue date:	2007-11-05
CVE Names:	CVE-2007-1659 CVE-2007-1660

Multiple flaws were found in the way pcre handles certain malformed 
regular expressions. If an application linked against pcre, such as 
Konqueror, parses a malicious regular expression, it may be possible to 
run arbitrary code as the user running the application. (CVE-2007-1659, 
CVE-2007-1660)

SL 4.x

   SRPMS:
pcre-4.5-4.el4_5.1.src.rpm
   i386:
pcre-4.5-4.1.i386.rpm
pcre-devel-4.5-4.1.i386.rpm
   x86_64:
pcre-4.5-4.1.i386.rpm
pcre-4.5-4.1.x86_64.rpm
pcre-devel-4.5-4.1.x86_64.rpm

SL 5.x

   SRPMS:
pcre-6.6-2.el5_0.1.src.rpm
   i386:
pcre-6.6-2.el5.1.i386.rpm
pcre-devel-6.6-2.el5.1.i386.rpm
   x86_64:
pcre-6.6-2.el5.1.i386.rpm
pcre-6.6-2.el5.1.x86_64.rpm
pcre-devel-6.6-2.el5.1.i386.rpm
pcre-devel-6.6-2.el5.1.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2