Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in pcre
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in pcre
ID: RHSA-2007:1063-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Do, 29. November 2007, 16:57
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660
Applikationen: PCRE

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: pcre security update
Advisory ID: RHSA-2007:1063-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1063.html
Issue date: 2007-11-29
Updated on: 2007-11-29
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-7228 CVE-2007-1660
- ---------------------------------------------------------------------

1. Summary:

Updated pcre packages that resolve several security issues are now
available for Red Hat Enterprise Linux 3.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

PCRE is a Perl-compatible regular expression library.

Flaws were discovered in the way PCRE handles certain malformed regular
expressions. If an application linked against PCRE, such as Konqueror,
parsed a malicious regular expression, it may have been possible to run
arbitrary code as the user running the application. (CVE-2006-7228,
CVE-2007-1660)

Users of PCRE are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Red Hat would like to thank Ludwig Nussel for reporting these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

315881 - CVE-2007-1660 pcre regular expression flaws
383371 - CVE-2006-7228 pcre integer overflow

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/pcre-3.9-10.4.src.rpm
44ea64b64fa610c91ae055878e4e8085 pcre-3.9-10.4.src.rpm

i386:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
e9ea2e70165ac3d7e95249ccd16a9983 pcre-devel-3.9-10.4.i386.rpm

ia64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
fd7349f54aceb88dcd86b267f812bafc pcre-3.9-10.4.ia64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
f9c1e6ff16151dc24ae22b51ab0c79f2 pcre-debuginfo-3.9-10.4.ia64.rpm
721a7dfcd642f66fcbcc2ac04afdb8bb pcre-devel-3.9-10.4.ia64.rpm

ppc:
adf37fe2c059c2cfe6a0f4f844603e29 pcre-3.9-10.4.ppc.rpm
4c1c16803cb4ae09a5242d059d51658b pcre-3.9-10.4.ppc64.rpm
81c5a80144897a28c1d28a3a590c3f88 pcre-debuginfo-3.9-10.4.ppc.rpm
605e239ef723907e2d4bdb359886d809 pcre-debuginfo-3.9-10.4.ppc64.rpm
faa3350c0417e79165768dafa44fd495 pcre-devel-3.9-10.4.ppc.rpm

s390:
432d71cf2022271a823ead5d9549504f pcre-3.9-10.4.s390.rpm
2939c20c7b5fa5cb63bb8d12fa23f3bc pcre-debuginfo-3.9-10.4.s390.rpm
ebf139993b5ee8f90d1668acf229d202 pcre-devel-3.9-10.4.s390.rpm

s390x:
432d71cf2022271a823ead5d9549504f pcre-3.9-10.4.s390.rpm
3a808e46628e79d79c7e808aacc44c15 pcre-3.9-10.4.s390x.rpm
2939c20c7b5fa5cb63bb8d12fa23f3bc pcre-debuginfo-3.9-10.4.s390.rpm
91e8e1fa0791367d99d051eecc0b9179 pcre-debuginfo-3.9-10.4.s390x.rpm
24b9c346b9c686fe3cf12768673bab18 pcre-devel-3.9-10.4.s390x.rpm

x86_64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
0d5e674d6622efd83c07fdcd16ba3dc2 pcre-3.9-10.4.x86_64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
dd121878136f47104359f54deb77b0dd pcre-debuginfo-3.9-10.4.x86_64.rpm
b6d06e7efdfd9ed8b35a15b1370808c6 pcre-devel-3.9-10.4.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/pcre-3.9-10.4.src.rpm
44ea64b64fa610c91ae055878e4e8085 pcre-3.9-10.4.src.rpm

i386:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
e9ea2e70165ac3d7e95249ccd16a9983 pcre-devel-3.9-10.4.i386.rpm

x86_64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
0d5e674d6622efd83c07fdcd16ba3dc2 pcre-3.9-10.4.x86_64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
dd121878136f47104359f54deb77b0dd pcre-debuginfo-3.9-10.4.x86_64.rpm
b6d06e7efdfd9ed8b35a15b1370808c6 pcre-devel-3.9-10.4.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/pcre-3.9-10.4.src.rpm
44ea64b64fa610c91ae055878e4e8085 pcre-3.9-10.4.src.rpm

i386:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
e9ea2e70165ac3d7e95249ccd16a9983 pcre-devel-3.9-10.4.i386.rpm

ia64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
fd7349f54aceb88dcd86b267f812bafc pcre-3.9-10.4.ia64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
f9c1e6ff16151dc24ae22b51ab0c79f2 pcre-debuginfo-3.9-10.4.ia64.rpm
721a7dfcd642f66fcbcc2ac04afdb8bb pcre-devel-3.9-10.4.ia64.rpm

x86_64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
0d5e674d6622efd83c07fdcd16ba3dc2 pcre-3.9-10.4.x86_64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
dd121878136f47104359f54deb77b0dd pcre-debuginfo-3.9-10.4.x86_64.rpm
b6d06e7efdfd9ed8b35a15b1370808c6 pcre-devel-3.9-10.4.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/pcre-3.9-10.4.src.rpm
44ea64b64fa610c91ae055878e4e8085 pcre-3.9-10.4.src.rpm

i386:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
e9ea2e70165ac3d7e95249ccd16a9983 pcre-devel-3.9-10.4.i386.rpm

ia64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
fd7349f54aceb88dcd86b267f812bafc pcre-3.9-10.4.ia64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
f9c1e6ff16151dc24ae22b51ab0c79f2 pcre-debuginfo-3.9-10.4.ia64.rpm
721a7dfcd642f66fcbcc2ac04afdb8bb pcre-devel-3.9-10.4.ia64.rpm

x86_64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
0d5e674d6622efd83c07fdcd16ba3dc2 pcre-3.9-10.4.x86_64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
dd121878136f47104359f54deb77b0dd pcre-debuginfo-3.9-10.4.x86_64.rpm
b6d06e7efdfd9ed8b35a15b1370808c6 pcre-devel-3.9-10.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHTtM3XlSAg2UNWIIRAsOWAJ9oMn7V6qFZFrdQQF0c0NG+si3XTQCfUEaW
bR3m4KOaylsgKf1zo8E2umc=
=+hYj
-----END PGP SIGNATURE-----



--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung