rPath Security Advisory: 2007-0231-1 Published: 2007-11-06 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Remote Unauthorized Access Updated Versions: pcre=conary.rpath.com@rpl:1/7.4-0.2-1 rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-1738 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768 Description: Previous versions of the pcre package contain multiple vulnerabilities, the worst of which may allow an attacker to execute arbitrary code. The pcre library and utilities are not known to be exposed via any privileged or remote interfaces within rPath Linux by default, but many applications linked to the pcre library are routinely exposed to remote or untrusted data; some examples include httpd, some PHP applications, and various KDE components. http://wiki.rpath.com/Advisories:rPSA-2007-0231 Copyright 2007 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html