exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2015-137

Mandriva Linux Security Advisory 2015-137
Posted Mar 30, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-137 - A flaw was found in the way PCRE handled certain malformed regular expressions. This issue could cause an application linked against PCRE to crash while parsing malicious regular expressions.

tags | advisory
systems | linux, mandriva
advisories | CVE-2014-8964
SHA-256 | 3f1acf93b81dd2f291d5c88b3fdbd7075ea2f9e1852e2d13d0088a3fa3175a93

Mandriva Linux Security Advisory 2015-137

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2015:137
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : pcre
Date : March 29, 2015
Affected: Business Server 2.0
_______________________________________________________________________

Problem Description:

Updated pcre packages fix security vulnerability:

A flaw was found in the way PCRE handled certain malformed regular
expressions. This issue could cause an application linked against PCRE
to crash while parsing malicious regular expressions (CVE-2014-8964).
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964
http://advisories.mageia.org/MGASA-2014-0534.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 2/X86_64:
1b10226cd1fff1474e1dbc26a1f6e568 mbs2/x86_64/lib64pcre16_0-8.33-3.1.mbs2.x86_64.rpm
9d96bed4ff00a80f97c6608323b9c3d1 mbs2/x86_64/lib64pcre1-8.33-3.1.mbs2.x86_64.rpm
828e753e611efe1f24d5b9a3bd5a03f3 mbs2/x86_64/lib64pcre32_0-8.33-3.1.mbs2.x86_64.rpm
7b37be9ed4178ed641da0962303b9a20 mbs2/x86_64/lib64pcrecpp0-8.33-3.1.mbs2.x86_64.rpm
721dc8a32888050c4214468719b1eb6e mbs2/x86_64/lib64pcrecpp-devel-8.33-3.1.mbs2.x86_64.rpm
117e723814672656a7081ab47529e5a7 mbs2/x86_64/lib64pcre-devel-8.33-3.1.mbs2.x86_64.rpm
04a303cb1814f2b04aa6755c2e27408f mbs2/x86_64/lib64pcreposix0-8.33-3.1.mbs2.x86_64.rpm
98564f8a99d44fd21fd9fe09f5f201cb mbs2/x86_64/lib64pcreposix1-8.33-3.1.mbs2.x86_64.rpm
8cd4746fde32f4d4ab0b47056feb9f86 mbs2/x86_64/lib64pcreposix-devel-8.33-3.1.mbs2.x86_64.rpm
916cfb13efdb6b8bc4ff68b4c1170594 mbs2/x86_64/pcre-8.33-3.1.mbs2.x86_64.rpm
712e87ab247bc30b84f5729263770dc7 mbs2/SRPMS/pcre-8.33-3.1.mbs2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVF9EfmqjQ0CJFipgRAkybAJ9x6/t7KNU2Di4naqz4S7lAaAUVDQCeIWKQ
7So+s8xf2DLfaWZyl4mFf+o=
=8Goh
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close