Login
Newsletter
Werbung

Sicherheit: Denial of Service in PCRE
Aktuelle Meldungen Distributionen
Name: Denial of Service in PCRE
ID: MDVSA-2015:137
Distribution: Mandriva
Plattformen: Mandriva Business Server 2.0
Datum: So, 29. März 2015, 14:12
Referenzen: http://advisories.mageia.org/MGASA-2014-0534.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964
Applikationen: PCRE

Originalnachricht

This is a multi-part message in MIME format...

------------=_1427628102-10360-36

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2015:137
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : pcre
Date : March 29, 2015
Affected: Business Server 2.0
_______________________________________________________________________

Problem Description:

Updated pcre packages fix security vulnerability:

A flaw was found in the way PCRE handled certain malformed regular
expressions. This issue could cause an application linked against PCRE
to crash while parsing malicious regular expressions (CVE-2014-8964).
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964
http://advisories.mageia.org/MGASA-2014-0534.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 2/X86_64:
1b10226cd1fff1474e1dbc26a1f6e568
mbs2/x86_64/lib64pcre16_0-8.33-3.1.mbs2.x86_64.rpm
9d96bed4ff00a80f97c6608323b9c3d1
mbs2/x86_64/lib64pcre1-8.33-3.1.mbs2.x86_64.rpm
828e753e611efe1f24d5b9a3bd5a03f3
mbs2/x86_64/lib64pcre32_0-8.33-3.1.mbs2.x86_64.rpm
7b37be9ed4178ed641da0962303b9a20
mbs2/x86_64/lib64pcrecpp0-8.33-3.1.mbs2.x86_64.rpm
721dc8a32888050c4214468719b1eb6e
mbs2/x86_64/lib64pcrecpp-devel-8.33-3.1.mbs2.x86_64.rpm
117e723814672656a7081ab47529e5a7
mbs2/x86_64/lib64pcre-devel-8.33-3.1.mbs2.x86_64.rpm
04a303cb1814f2b04aa6755c2e27408f
mbs2/x86_64/lib64pcreposix0-8.33-3.1.mbs2.x86_64.rpm
98564f8a99d44fd21fd9fe09f5f201cb
mbs2/x86_64/lib64pcreposix1-8.33-3.1.mbs2.x86_64.rpm
8cd4746fde32f4d4ab0b47056feb9f86
mbs2/x86_64/lib64pcreposix-devel-8.33-3.1.mbs2.x86_64.rpm
916cfb13efdb6b8bc4ff68b4c1170594 mbs2/x86_64/pcre-8.33-3.1.mbs2.x86_64.rpm
712e87ab247bc30b84f5729263770dc7 mbs2/SRPMS/pcre-8.33-3.1.mbs2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVF9EfmqjQ0CJFipgRAkybAJ9x6/t7KNU2Di4naqz4S7lAaAUVDQCeIWKQ
7So+s8xf2DLfaWZyl4mFf+o=
=8Goh
-----END PGP SIGNATURE-----


------------=_1427628102-10360-36
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1427628102-10360-36--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung