-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:137 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : pcre Date : March 29, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated pcre packages fix security vulnerability: A flaw was found in the way PCRE handled certain malformed regular expressions. This issue could cause an application linked against PCRE to crash while parsing malicious regular expressions (CVE-2014-8964). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964 http://advisories.mageia.org/MGASA-2014-0534.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 2/X86_64: 1b10226cd1fff1474e1dbc26a1f6e568 mbs2/x86_64/lib64pcre16_0-8.33-3.1.mbs2.x86_64.rpm 9d96bed4ff00a80f97c6608323b9c3d1 mbs2/x86_64/lib64pcre1-8.33-3.1.mbs2.x86_64.rpm 828e753e611efe1f24d5b9a3bd5a03f3 mbs2/x86_64/lib64pcre32_0-8.33-3.1.mbs2.x86_64.rpm 7b37be9ed4178ed641da0962303b9a20 mbs2/x86_64/lib64pcrecpp0-8.33-3.1.mbs2.x86_64.rpm 721dc8a32888050c4214468719b1eb6e mbs2/x86_64/lib64pcrecpp-devel-8.33-3.1.mbs2.x86_64.rpm 117e723814672656a7081ab47529e5a7 mbs2/x86_64/lib64pcre-devel-8.33-3.1.mbs2.x86_64.rpm 04a303cb1814f2b04aa6755c2e27408f mbs2/x86_64/lib64pcreposix0-8.33-3.1.mbs2.x86_64.rpm 98564f8a99d44fd21fd9fe09f5f201cb mbs2/x86_64/lib64pcreposix1-8.33-3.1.mbs2.x86_64.rpm 8cd4746fde32f4d4ab0b47056feb9f86 mbs2/x86_64/lib64pcreposix-devel-8.33-3.1.mbs2.x86_64.rpm 916cfb13efdb6b8bc4ff68b4c1170594 mbs2/x86_64/pcre-8.33-3.1.mbs2.x86_64.rpm 712e87ab247bc30b84f5729263770dc7 mbs2/SRPMS/pcre-8.33-3.1.mbs2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFVF9EfmqjQ0CJFipgRAkybAJ9x6/t7KNU2Di4naqz4S7lAaAUVDQCeIWKQ 7So+s8xf2DLfaWZyl4mFf+o= =8Goh -----END PGP SIGNATURE-----