pcre3 -- buffer overflow

2008-02-19T00:00:00
ID DSA-1499
Type debian
Reporter Debian
Modified 2008-02-19T00:00:00

Description

It was discovered that specially crafted regular expressions involving codepoints greater than 255 could cause a buffer overflow in the PCRE library (CVE-2008-0674).

For the old stable distribution (sarge), this problem has been fixed in version 4.5+7.4-2.

For the stable distribution (etch), this problem has been fixed in version 6.7+7.4-3.

For the unstable distribution (sid), this problem has been fixed in version 7.6-1.

We recommend that you upgrade your pcre3 package.