---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Fedora update for pcre SECUNIA ADVISORY ID: SA16572 VERIFY ADVISORY: http://secunia.com/advisories/16572/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/ Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. For more information: SA16502 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ cfca595b559afe8d33cbc39ab744d6db SRPMS/pcre-4.5-3.1.1.fc3.src.rpm 9f498d84c73b744cd03b2b93aca582c6 x86_64/pcre-4.5-3.1.1.fc3.x86_64.rpm 344d94e5b5b64c6422c71fec331dd94c x86_64/pcre-devel-4.5-3.1.1.fc3.x86_64.rpm 08efe09b0a59fcff8df2b42a1b64309a x86_64/debug/pcre-debuginfo-4.5-3.1.1.fc3.x86_64.rpm 81729fbca4064dd687bab07ae6cf9fd1 x86_64/pcre-4.5-3.1.1.fc3.i386.rpm 81729fbca4064dd687bab07ae6cf9fd1 i386/pcre-4.5-3.1.1.fc3.i386.rpm 35b406ce33a16b67b73a600ab5cb5b3e i386/pcre-devel-4.5-3.1.1.fc3.i386.rpm 14c8d8b5d8dec038bd54f9e16668d5da i386/debug/pcre-debuginfo-4.5-3.1.1.fc3.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ ec1decec12e651d1d5bec690e3627a7d SRPMS/pcre-5.0-4.1.fc4.src.rpm 1b891f92b05f283dfdb34b741d80cc56 ppc/pcre-5.0-4.1.fc4.ppc.rpm 6eaa9ffa13d1c54c2a77f3e38c09b243 ppc/pcre-devel-5.0-4.1.fc4.ppc.rpm 6cbe01b454cf34947086ac285f1b2434 ppc/debug/pcre-debuginfo-5.0-4.1.fc4.ppc.rpm 6f850622f337cc426174855d078080cf ppc/pcre-5.0-4.1.fc4.ppc64.rpm f47bed04d3eeb5df7dd3eae206a4efc9 x86_64/pcre-5.0-4.1.fc4.x86_64.rpm 59d58d979da779954a975fd3b147c892 x86_64/pcre-devel-5.0-4.1.fc4.x86_64.rpm c84a457fb0b05b28a32f4c225445091f x86_64/debug/pcre-debuginfo-5.0-4.1.fc4.x86_64.rpm 31bcef8ff26efea03e2a2825364ab420 x86_64/pcre-5.0-4.1.fc4.i386.rpm 31bcef8ff26efea03e2a2825364ab420 i386/pcre-5.0-4.1.fc4.i386.rpm f8ff870b071671a3a4757fc38460a95d i386/pcre-devel-5.0-4.1.fc4.i386.rpm 198825cc873affdfe8dde48fb52b3556 i386/debug/pcre-debuginfo-5.0-4.1.fc4.i386.rpm OTHER REFERENCES: SA16502: http://secunia.com/advisories/16502/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------