<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="0043a7d041d83e41c8e86dce3826eb59"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="54">
  <id>pcre</id>
  <title>pcre security update</title>
  <release>openSUSE 11.0</release>
  <issued date="1214225097"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=400013" id="400013" title="bug number 400013" type="bugzilla"/>
  </references>
  <description>Specially crafted regular expressions could lead to a
buffer overflow in the  pcre library. Applications using
pcre to process regular expressions from untrusted sources
could therefore potentially be exploited by attackers to
execute arbitrary code (CVE-2008-2371).
</description>
  <pkglist>
    <collection>
        <package name="pcre" arch="i586" version="7.6" release="22.2">
          <filename>pcre-7.6-22.2.i586.rpm</filename>
        </package>
        <package name="pcre" arch="ppc" version="7.6" release="22.2">
          <filename>pcre-7.6-22.2.ppc.rpm</filename>
        </package>
        <package name="pcre" arch="x86_64" version="7.6" release="22.2">
          <filename>pcre-7.6-22.2.x86_64.rpm</filename>
        </package>
        <package name="pcre-32bit" arch="x86_64" version="7.6" release="22.2">
          <filename>pcre-32bit-7.6-22.2.x86_64.rpm</filename>
        </package>
        <package name="pcre-64bit" arch="ppc" version="7.6" release="22.2">
          <filename>pcre-64bit-7.6-22.2.ppc.rpm</filename>
        </package>
        <package name="pcre-devel" arch="i586" version="7.6" release="22.2">
          <filename>pcre-devel-7.6-22.2.i586.rpm</filename>
        </package>
        <package name="pcre-devel" arch="ppc" version="7.6" release="22.2">
          <filename>pcre-devel-7.6-22.2.ppc.rpm</filename>
        </package>
        <package name="pcre-devel" arch="x86_64" version="7.6" release="22.2">
          <filename>pcre-devel-7.6-22.2.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
