Описание
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 7.4-0ubuntu0.6.06.1 |
devel | not-affected | |
edgy | released | 7.4-0ubuntu0.6.10.1 |
feisty | released | 7.4-0ubuntu0.7.04.1 |
gutsy | not-affected | |
upstream | released | 7.0 |
Показывать по
Ссылки на источники
4.3 Medium
CVSS2
Связанные уязвимости
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not ...
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
ELSA-2007-1059: Important: pcre security update (IMPORTANT)
4.3 Medium
CVSS2