AnNyung Official Homepage Home > Update [ 1.3 ]  

HOME
What is AnNyung
Documents
Packages System
White Paper
Download
Update
  . 3.x [RSS]
  . 2.x [RSS]
  . 1.3 [RSS]
  . 1.2 [RSS]
  . 1.1 [RSS]
  . 1.0 [RSS]
FAQ
Hardware
RoadMap
Gallery

  Go oops.org
  AnNyung banner 88x31

  AnNyung 1 banner 80x15
  AnNyung 2 banner 80x15
  AnNyung 3 banner 80x15
  AnNyung banner 80x15
  AnNyung banner 80x15



pcre 보안 업데이트
Web Browser 로는 FTP 접속이 불가능 합니다.

문서번호 : 1196671519
업데이트 : 2007.12.03


상세내용

- 보안버그 픽스

. CVE-2006-7224:
. CVE-2006-7225:
. CVE-2006-7226:

. CVE-2006-7228:
Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7
might allow context-dependent attackers to execute arbitrary code via a regular
expression that involves large (1) min, (2) max, or (3) duplength values that
cause an incorrect length calculation and trigger a buffer overflow, a different
vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by
CVE-2006-7224, but that CVE has been REJECTED and split.

. CVE-2006-7230:
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly
calculate the amount of memory needed for a compiled regular expression pattern
when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows
context-dependent attackers to cause a denial of service (PCRE or glibc crash)
via crafted regular expressions.

. CVE-2007-1659:
Perl-Compatible Regular Expression (PCRE) library before 7.3 allows
context-dependent attackers to cause a denial of service (crash) and possibly
execute arbitrary code via regex patters containing unmatched "\Q\E" sequences
with orphan "\E" codes.


Autoupdates 지원 : 지원
  pkgsysupdate


update 패키지

  RPMS :

    . pcre-4.5-5.i686.rpm
    . pcre-devel-4.5-5.i686.rpm

  SRPMS :

    . pcre-4.5-5.src.rpm


참고 : 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659



    



 Home > Update [ 1.3 ]

Copyright 2024 OOPS Development Organization 
LAST MODIFIED: 2018/04/10