---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: SUSE update for pcre SECUNIA ADVISORY ID: SA27773 VERIFY ADVISORY: http://secunia.com/advisories/27773/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: openSUSE 10.3 http://secunia.com/product/16124/ openSUSE 10.2 http://secunia.com/product/13375/ SUSE Linux 10.1 http://secunia.com/product/10796/ SUSE Linux 10 http://secunia.com/product/6221/ SuSE Linux Enterprise Server 8 http://secunia.com/product/1171/ SuSE Linux Openexchange Server 4.x http://secunia.com/product/2001/ SuSE Linux Standard Server 8 http://secunia.com/product/2526/ SUSE Linux Enterprise Server 9 http://secunia.com/product/4118/ SuSE Linux Desktop 1.x http://secunia.com/product/2002/ SUSE Linux Enterprise Server 10 http://secunia.com/product/12192/ UnitedLinux 1.0 http://secunia.com/product/2003/ DESCRIPTION: SUSE has issued an update for pcre. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, and compromise a vulnerable system. For more information: SA27543 SA27582 SOLUTION: Apply updated packages. x86 Platform: openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/pcre-7.2-14.2.i586.rpm 638bc8ea3b3049bf8f018cbe2c636c8c http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/pcre-devel-7.2-14.2.i586.rpm 2aba0cac3367280a938bf7d0e75b811c openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/pcre-6.7-25.i586.rpm aae587979521d9215fcedeba6ffdd5d3 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/pcre-devel-6.7-25.i586.rpm 67e29afb709d1f1d3270cd259afc3302 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcre-6.4-14.12.i586.rpm f23b3c0a085307189770ef6446ddf95e ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcre-devel-6.4-14.12.i586.rpm 360c141d251b19d20bc87f02c014ca85 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/pcre-6.2-2.6.i586.rpm a6d52c75af7b87f5839c93ad765fc471 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/pcre-devel-6.2-2.6.i586.rpm 3127d163cb29fe4023d9ce7de694992f Power PC Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/pcre-6.7-25.ppc.rpm 31efc0735941f2ba8e378c5282715a14 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/pcre-devel-6.7-25.ppc.rpm 10a13246ef2f68b9b59a33e80bb50a7d SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcre-6.4-14.12.ppc.rpm 44ddec7ac85dbf91cb34afb089357d4d ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcre-devel-6.4-14.12.ppc.rpm e8e6d6c2f78904a886114f635bf184a9 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/pcre-6.2-2.6.ppc.rpm 61f6f3eda12cfa2daab879ab39169d22 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/pcre-devel-6.2-2.6.ppc.rpm 0e4859e31522fb242ffab6a07aaf77fa openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/pcre-7.2-14.2.ppc.rpm a54e3a3eddaabc9f89d6019bb12f2081 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/pcre-devel-7.2-14.2.ppc.rpm 9043d0181ba37fc0c86fae3429f1cda0 x86-64 Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/pcre-32bit-6.7-25.x86_64.rpm b4a5e803fba79cce1dca2f60fbf5c72c ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/pcre-6.7-25.x86_64.rpm cb81d1ee51a9ad918168e986f16e028f ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/pcre-devel-6.7-25.x86_64.rpm 322c88af597a52657e403a7268e752d0 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcre-32bit-6.4-14.12.x86_64.rpm 527b30661fa36d99d80cbd6e3051d45a ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcre-6.4-14.12.x86_64.rpm 347cf67ca766245983a736af5529cc0d ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcre-devel-6.4-14.12.x86_64.rpm c8a3ba1109569e7bc39331c1ada22d43 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/pcre-32bit-6.2-2.6.x86_64.rpm 11bff919ac213631e0b10838de3e2e74 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/pcre-6.2-2.6.x86_64.rpm dd475be9f1d852b35907d540d1e1afe9 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/pcre-devel-6.2-2.6.x86_64.rpm 8a09951c95692f97ae5772594e5f7f44 openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/pcre-32bit-7.2-14.2.x86_64.rpm 6132117b7d5c9c22564384d8e16447c4 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/pcre-7.2-14.2.x86_64.rpm 411c7ab54802ff8bf2abc03cea0d0d39 http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/pcre-devel-7.2-14.2.x86_64.rpm 7856ed6adf0fc2d38e95777b8f050ee0 Sources: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/pcre-6.7-25.src.rpm f5fbd77e5a2bb3ab5b4e2079eb66c9f8 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/pcre-6.4-14.12.src.rpm 605123a0c31cb6019d0a71cc8f998bb5 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/pcre-6.2-2.6.src.rpm edea2557792769392a29bebef2136ea9 openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/pcre-7.2-14.2.src.rpm 3ad3dbb6ba1fe69dd2b0bf265191e267 UnitedLinux 1.0 http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html SuSE Linux Openexchange Server 4 http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html SuSE Linux Enterprise Server 8 http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html SuSE Linux Standard Server 8 http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html SuSE Linux School Server http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html SUSE LINUX Retail Solution 8 http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html SuSE Linux Desktop 1.0 http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html Open Enterprise Server http://support.novell.com/techcenter/psdb/9992478cea3704f6f2c2f7741f3e12e2.html Novell Linux POS 9 http://support.novell.com/techcenter/psdb/9992478cea3704f6f2c2f7741f3e12e2.html Novell Linux Desktop 9 http://support.novell.com/techcenter/psdb/9992478cea3704f6f2c2f7741f3e12e2.html SUSE SLES 9 http://support.novell.com/techcenter/psdb/9992478cea3704f6f2c2f7741f3e12e2.html SUSE Linux Enterprise Server 10 SP1 http://support.novell.com/techcenter/psdb/ed2f85edfa5f04634eda2d480d600b13.html SLE SDK 10 SP1 http://support.novell.com/techcenter/psdb/ed2f85edfa5f04634eda2d480d600b13.html SUSE Linux Enterprise Desktop 10 SP1 http://support.novell.com/techcenter/psdb/ed2f85edfa5f04634eda2d480d600b13.html ORIGINAL ADVISORY: http://lists.opensuse.org/opensuse-security-announce/2007-11/msg00004.html OTHER REFERENCES: SA27543: http://secunia.com/advisories/27543/ SA27582: http://secunia.com/advisories/27582/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------