Specially crafted regular expressions could lead to buffer overflows in the pcre library. Applications using pcre to process regular expressions from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code as the user running the application.
There is no known workaround, please install the update packages.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE | 10.3 | ppc | pcre-devel | < 7.2-14.2 | pcre-devel-7.2-14.2.ppc.rpm |
openSUSE | 10.1 | i586 | pcre | < 6.4-14.12 | pcre-6.4-14.12.i586.rpm |
openSUSE | 10.0 | ppc | pcre | < 6.2-2.6 | pcre-6.2-2.6.ppc.rpm |
openSUSE | 10.3 | x86_64 | pcre-devel | < 7.2-14.2 | pcre-devel-7.2-14.2.x86_64.rpm |
SUSE Linux Enterprise Software Development Kit | 10.1 | ppc | pcre-devel | < 6.4-14.12 | pcre-devel-6.4-14.12.ppc.rpm |
SUSE Linux Enterprise Server | 10.1 | s390x | pcre | < 6.4-14.12 | pcre-6.4-14.12.s390x.rpm |
openSUSE | 10.0 | ppc | pcre-devel | < 6.2-2.6 | pcre-devel-6.2-2.6.ppc.rpm |
openSUSE | 10.1 | x86_64 | pcre-devel | < 6.4-14.12 | pcre-devel-6.4-14.12.x86_64.rpm |
openSUSE | 10.0 | i586 | pcre-devel | < 6.2-2.6 | pcre-devel-6.2-2.6.i586.rpm |
openSUSE | 10.0 | i586 | pcre | < 6.2-2.6 | pcre-6.2-2.6.i586.rpm |