CVE-2008-2371
Publication date 7 July 2008
Last updated 24 July 2024
Ubuntu priority
Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.
Status
Package | Ubuntu Release | Status |
---|---|---|
erlang | 9.10 karmic |
Fixed 1:13.b.1-dfsg-2ubuntu1.1
|
9.04 jaunty |
Fixed 1:12.b.5-dfsg-2ubuntu0.1
|
|
8.10 intrepid |
Fixed 1:12.b.3-dfsg-1ubuntu1.1
|
|
8.04 LTS hardy |
Not affected
|
|
6.06 LTS dapper |
Not affected
|
|
pcre3 | 9.10 karmic |
Not affected
|
9.04 jaunty |
Not affected
|
|
8.10 intrepid |
Fixed 7.6-2.1ubuntu1
|
|
8.04 LTS hardy |
Fixed 7.4-1ubuntu2.1
|
|
7.10 gutsy |
Fixed 7.4-0ubuntu0.7.10.3
|
|
7.04 feisty |
Fixed 7.4-0ubuntu0.7.04.3
|
|
6.06 LTS dapper |
Fixed 7.4-0ubuntu0.6.06.3
|
|
php5 | 9.10 karmic |
Not affected
|
9.04 jaunty |
Not affected
|
|
8.10 intrepid |
Not affected
|
|
8.04 LTS hardy |
Fixed 5.2.4-2ubuntu5.3
|
|
7.10 gutsy |
Fixed 5.2.3-1ubuntu6.4
|
|
7.04 feisty |
Not affected
|
|
6.06 LTS dapper |
Not affected
|
Notes
jdstrand
kees did pcre3 update php5 on dapper and feisty is not vulnerable jdstrand sponsored erlang update for karmic and lucid
Patch details
Package | Patch details |
---|---|
erlang |
|
php5 |