The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


MDKSA-2005:151 - Updated pcre packages fix integer overflow vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: Mandriva Security Team <security@mandriva.com.>
To: [email protected]
Subject: MDKSA-2005:151 - Updated pcre packages fix integer overflow vulnerability
Message-Id: <E1E8QUy-00047x-0c@mercury.mandriva.com.>
Sender: QATeam User <qateam@mercury.mandriva.com.>
Date: Thu, 25 Aug 2005 16:47:04 -0600
X-Virus-Scanned: antivirus-gw at tyumen.ru

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandriva Linux Security Update Advisory
 _______________________________________________________________________


 Package name:           pcre
 Advisory ID:            MDKSA-2005:151
 Date:                   August 25th, 2005

 Affected versions:	 10.0, 10.1, 10.2, Corporate 3.0,
         Corporate Server 2.1,
         Multi Network Firewall 2.0
 ______________________________________________________________________

 Problem Description:

 Integer overflow in pcre_compile.c in Perl Compatible Regular
 Expressions (PCRE) before 6.2, as used in multiple products, allows
 attackers to execute arbitrary code via quantifier values in regular
 expressions, which leads to a heap-based buffer overflow.
 
 The updated packages have been patched to correct this problem.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 309b57502a08710bc746463e40564c2e  10.0/RPMS/libpcre0-4.5-3.1.100mdk.i586.rpm
 a7f390ea8291db6a913db92434ab4fd1  10.0/RPMS/libpcre0-devel-4.5-3.1.100mdk.i586.rpm
 e7ad5f3caae546bc9f76d90c53d98131  10.0/RPMS/pcre-4.5-3.1.100mdk.i586.rpm
 e832acf199d237eb25869d3e1dd1f3a5  10.0/SRPMS/pcre-4.5-3.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 5ec78978882ae59e235036f463caf728  amd64/10.0/RPMS/lib64pcre0-4.5-3.1.100mdk.amd64.rpm
 c1ea77b8c96a64de277200642c0f39c4  amd64/10.0/RPMS/lib64pcre0-devel-4.5-3.1.100mdk.amd64.rpm
 459960f18b926090eccfbae6faa0c84f  amd64/10.0/RPMS/pcre-4.5-3.1.100mdk.amd64.rpm
 e832acf199d237eb25869d3e1dd1f3a5  amd64/10.0/SRPMS/pcre-4.5-3.1.100mdk.src.rpm

 Mandrakelinux 10.1:
 5fb1ddf8ac2ed8bb2268bf3e18b64529  10.1/RPMS/libpcre0-4.5-5.1.101mdk.i586.rpm
 819b1b79f017971f145b8c12b78cc593  10.1/RPMS/libpcre0-devel-4.5-5.1.101mdk.i586.rpm
 acb97853ce1673ad72027ff5057428c0  10.1/RPMS/pcre-4.5-5.1.101mdk.i586.rpm
 f4a2d968098de33876cc7ad022f4e751  10.1/SRPMS/pcre-4.5-5.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 03249093a10cb990ec3cc5a362924841  x86_64/10.1/RPMS/lib64pcre0-4.5-5.1.101mdk.x86_64.rpm
 f74eadbea48228c62d1093622c6e9bb9  x86_64/10.1/RPMS/lib64pcre0-devel-4.5-5.1.101mdk.x86_64.rpm
 1a0c903d0391d7f935786a84d2fa66eb  x86_64/10.1/RPMS/pcre-4.5-5.1.101mdk.x86_64.rpm
 f4a2d968098de33876cc7ad022f4e751  x86_64/10.1/SRPMS/pcre-4.5-5.1.101mdk.src.rpm

 Mandrakelinux 10.2:
 4b3dcaf88712905c07eb9d1eea48f426  10.2/RPMS/libpcre0-5.0-2.1.102mdk.i586.rpm
 93f5253396e53c95b5aebb79a290957c  10.2/RPMS/libpcre0-devel-5.0-2.1.102mdk.i586.rpm
 c42b2c321aacd8fc36aaed195aaed054  10.2/RPMS/pcre-5.0-2.1.102mdk.i586.rpm
 c9bd1f6fd2816a6ff02c08533faa700a  10.2/SRPMS/pcre-5.0-2.1.102mdk.src.rpm

 Mandrakelinux 10.2/X86_64:
 9c16f12aec35bc1d32932ecf478e0672  x86_64/10.2/RPMS/lib64pcre0-5.0-2.1.102mdk.x86_64.rpm
 93ff357fa977d8a26ac5a4a0ef2b6400  x86_64/10.2/RPMS/lib64pcre0-devel-5.0-2.1.102mdk.x86_64.rpm
 a2ceb2799814de8984ca6707b497fce5  x86_64/10.2/RPMS/pcre-5.0-2.1.102mdk.x86_64.rpm
 c9bd1f6fd2816a6ff02c08533faa700a  x86_64/10.2/SRPMS/pcre-5.0-2.1.102mdk.src.rpm

 Multi Network Firewall 2.0:
 39a7d2f6d40af5ca22b7a78607b3217f  mnf/2.0/RPMS/libpcre0-4.5-3.1.M20mdk.i586.rpm
 de30c5803f323b1b124234c21f125b25  mnf/2.0/RPMS/pcre-4.5-3.1.M20mdk.i586.rpm
 6c8e57198db4380e69017f8299ff40e5  mnf/2.0/SRPMS/pcre-4.5-3.1.M20mdk.src.rpm

 Corporate Server 2.1:
 de01932f1bb779c78999762bb5057653  corporate/2.1/RPMS/libpcre0-3.9-5.1.C21mdk.i586.rpm
 2a7c71195755079fe3eee0fda834a7d9  corporate/2.1/RPMS/libpcre0-devel-3.9-5.1.C21mdk.i586.rpm
 aae9df225a2bdafa9f60feeb397f5796  corporate/2.1/RPMS/pcre-3.9-5.1.C21mdk.i586.rpm
 16ff4bcf36bba60143ac847e0ce91cb0  corporate/2.1/SRPMS/pcre-3.9-5.1.C21mdk.src.rpm

 Corporate Server 2.1/X86_64:
 d310322b1038159b0270ae62140e8b4c  x86_64/corporate/2.1/RPMS/libpcre0-3.9-5.1.C21mdk.x86_64.rpm
 7977cc9ab34756f1653e96e996abdfb4  x86_64/corporate/2.1/RPMS/libpcre0-devel-3.9-5.1.C21mdk.x86_64.rpm
 aad833aca80deac98d7157de58a9ef68  x86_64/corporate/2.1/RPMS/pcre-3.9-5.1.C21mdk.x86_64.rpm
 16ff4bcf36bba60143ac847e0ce91cb0  x86_64/corporate/2.1/SRPMS/pcre-3.9-5.1.C21mdk.src.rpm

 Corporate 3.0:
 18dd263d0c809022c870a29899eeb8b3  corporate/3.0/RPMS/libpcre0-4.5-3.2.C30mdk.i586.rpm
 674b5bba9b87dc2ed6e6fafe9c53abfc  corporate/3.0/RPMS/libpcre0-devel-4.5-3.2.C30mdk.i586.rpm
 d5df129d1e9d7800e1b9a97cccb96217  corporate/3.0/RPMS/pcre-4.5-3.2.C30mdk.i586.rpm
 e9f3f1d4a19b0396481871aa0c398c16  corporate/3.0/SRPMS/pcre-4.5-3.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 a5a97684dac58a4bce9748039c961278  x86_64/corporate/3.0/RPMS/lib64pcre0-4.5-3.2.C30mdk.x86_64.rpm
 d1dcd3f60940c3165d42b79c631b558d  x86_64/corporate/3.0/RPMS/lib64pcre0-devel-4.5-3.2.C30mdk.x86_64.rpm
 bc0dae706980d75df70c6080cb1968a4  x86_64/corporate/3.0/RPMS/pcre-4.5-3.2.C30mdk.x86_64.rpm
 e9f3f1d4a19b0396481871aa0c398c16  x86_64/corporate/3.0/SRPMS/pcre-4.5-3.2.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDDkpnmqjQ0CJFipgRAu+AAJ4rpwF57tztJVaEmZcskC8xc1QhoQCfaFCK
Co3E1meGMO7bWPtcuVYDSi4=
=JArc
-----END PGP SIGNATURE-----


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру