Public bug reported: Hi, again there is a big bug in libpcre3 which can cause a buffer overflow and lead to remote code execution.
Here's the changelog: http://www.pcre.org/changelog.txt ** Affects: pcre3 (Ubuntu) Importance: Undecided Status: New ** Affects: pcre3 (Gentoo Linux) Importance: Unknown Status: Unknown ** Visibility changed to: Public ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-0674 ** Bug watch added: Gentoo Bugzilla #209067 http://bugs.gentoo.org/show_bug.cgi?id=209067 ** Also affects: pcre3 (Gentoo Linux) via http://bugs.gentoo.org/show_bug.cgi?id=209067 Importance: Unknown Status: Unknown ** Description changed: Hi, again there is a big bug in libpcre3 which can cause a buffer overflow and lead to remote code execution. - Here's the changelog: http://bugs.gentoo.org/show_bug.cgi?id=209067 - Here the gentoo bug-report: http://bugs.gentoo.org/show_bug.cgi?id=209067 (already fixed) - CVE-Tag: CVE-2008-0674 + Here's the changelog: http://www.pcre.org/changelog.txt -- libpcre3 < 7.6 is vulnerable to a buffer overflow resulting in remote code execution bug https://bugs.launchpad.net/bugs/193230 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs