Name | CVE-2007-4768 |
Description | Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-1399-1, DSA-1570-1, DTSA-77-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
glib2.0 (PTS) | bullseye | 2.66.8-1+deb11u4 | fixed |
bullseye (security) | 2.66.8-1+deb11u5 | fixed | |
bookworm | 2.74.6-2+deb12u4 | fixed | |
bookworm (security) | 2.74.6-2+deb12u2 | fixed | |
sid, trixie | 2.82.2-3 | fixed | |
pcre3 (PTS) | bullseye | 2:8.39-13 | fixed |
bookworm | 2:8.39-15 | fixed | |
sid | 2:8.39-15.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
glib2.0 | source | (unstable) | 2.14.3-1 | unimportant | ||
kazehakase | source | etch | 0.4.2-1etch1 | DSA-1570-1 | ||
kazehakase | source | (unstable) | 0.5.2-1 | |||
pcre3 | source | sarge | 4.5+7.4-1 | DSA-1399-1 | ||
pcre3 | source | etch | 6.7+7.4-2 | DSA-1399-1 | ||
pcre3 | source | lenny | 6.7+7.4-2+lenny1 | DTSA-77-1 | ||
pcre3 | source | (unstable) | 7.3-1 |
glib only embeds pcre in the udeb, no attack vector