Home / vulnerabilities Mandriva Linux Security Advisory 2015-137
Posted on 31 March 2015
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2015:137
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : pcre
Date : March 29, 2015
Affected: Business Server 2.0
_______________________________________________________________________
Problem Description:
Updated pcre packages fix security vulnerability:
A flaw was found in the way PCRE handled certain malformed regular
expressions. This issue could cause an application linked against PCRE
to crash while parsing malicious regular expressions (CVE-2014-8964).
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964
http://advisories.mageia.org/MGASA-2014-0534.html
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
1b10226cd1fff1474e1dbc26a1f6e568 mbs2/x86_64/lib64pcre16_0-8.33-3.1.mbs2.x86_64.rpm
9d96bed4ff00a80f97c6608323b9c3d1 mbs2/x86_64/lib64pcre1-8.33-3.1.mbs2.x86_64.rpm
828e753e611efe1f24d5b9a3bd5a03f3 mbs2/x86_64/lib64pcre32_0-8.33-3.1.mbs2.x86_64.rpm
7b37be9ed4178ed641da0962303b9a20 mbs2/x86_64/lib64pcrecpp0-8.33-3.1.mbs2.x86_64.rpm
721dc8a32888050c4214468719b1eb6e mbs2/x86_64/lib64pcrecpp-devel-8.33-3.1.mbs2.x86_64.rpm
117e723814672656a7081ab47529e5a7 mbs2/x86_64/lib64pcre-devel-8.33-3.1.mbs2.x86_64.rpm
04a303cb1814f2b04aa6755c2e27408f mbs2/x86_64/lib64pcreposix0-8.33-3.1.mbs2.x86_64.rpm
98564f8a99d44fd21fd9fe09f5f201cb mbs2/x86_64/lib64pcreposix1-8.33-3.1.mbs2.x86_64.rpm
8cd4746fde32f4d4ab0b47056feb9f86 mbs2/x86_64/lib64pcreposix-devel-8.33-3.1.mbs2.x86_64.rpm
916cfb13efdb6b8bc4ff68b4c1170594 mbs2/x86_64/pcre-8.33-3.1.mbs2.x86_64.rpm
712e87ab247bc30b84f5729263770dc7 mbs2/SRPMS/pcre-8.33-3.1.mbs2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFVF9EfmqjQ0CJFipgRAkybAJ9x6/t7KNU2Di4naqz4S7lAaAUVDQCeIWKQ
7So+s8xf2DLfaWZyl4mFf+o=
=8Goh
-----END PGP SIGNATURE-----