Advisories
Mandriva Advisories
|
![]() |
Problem Description |
Integer overflow in pcre_compile.c in Perl Compatible Regular
Expressions (PCRE) before 6.2, as used in multiple products, allows
attackers to execute arbitrary code via quantifier values in regular
expressions, which leads to a heap-based buffer overflow.
The updated packages have been patched to correct this problem.
Updated Packages |
Mandrakelinux 10.0
309b57502a08710bc746463e40564c2e 10.0/RPMS/libpcre0-4.5-3.1.100mdk.i586.rpm a7f390ea8291db6a913db92434ab4fd1 10.0/RPMS/libpcre0-devel-4.5-3.1.100mdk.i586.rpm e7ad5f3caae546bc9f76d90c53d98131 10.0/RPMS/pcre-4.5-3.1.100mdk.i586.rpm e832acf199d237eb25869d3e1dd1f3a5 10.0/SRPMS/pcre-4.5-3.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64
5ec78978882ae59e235036f463caf728 amd64/10.0/RPMS/lib64pcre0-4.5-3.1.100mdk.amd64.rpm c1ea77b8c96a64de277200642c0f39c4 amd64/10.0/RPMS/lib64pcre0-devel-4.5-3.1.100mdk.amd64.rpm 459960f18b926090eccfbae6faa0c84f amd64/10.0/RPMS/pcre-4.5-3.1.100mdk.amd64.rpm e832acf199d237eb25869d3e1dd1f3a5 amd64/10.0/SRPMS/pcre-4.5-3.1.100mdk.src.rpm
Mandrakelinux 10.1
5fb1ddf8ac2ed8bb2268bf3e18b64529 10.1/RPMS/libpcre0-4.5-5.1.101mdk.i586.rpm 819b1b79f017971f145b8c12b78cc593 10.1/RPMS/libpcre0-devel-4.5-5.1.101mdk.i586.rpm acb97853ce1673ad72027ff5057428c0 10.1/RPMS/pcre-4.5-5.1.101mdk.i586.rpm f4a2d968098de33876cc7ad022f4e751 10.1/SRPMS/pcre-4.5-5.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64
03249093a10cb990ec3cc5a362924841 x86_64/10.1/RPMS/lib64pcre0-4.5-5.1.101mdk.x86_64.rpm f74eadbea48228c62d1093622c6e9bb9 x86_64/10.1/RPMS/lib64pcre0-devel-4.5-5.1.101mdk.x86_64.rpm 1a0c903d0391d7f935786a84d2fa66eb x86_64/10.1/RPMS/pcre-4.5-5.1.101mdk.x86_64.rpm f4a2d968098de33876cc7ad022f4e751 x86_64/10.1/SRPMS/pcre-4.5-5.1.101mdk.src.rpm
Corporate Server 2.1
de01932f1bb779c78999762bb5057653 corporate/2.1/RPMS/libpcre0-3.9-5.1.C21mdk.i586.rpm 2a7c71195755079fe3eee0fda834a7d9 corporate/2.1/RPMS/libpcre0-devel-3.9-5.1.C21mdk.i586.rpm aae9df225a2bdafa9f60feeb397f5796 corporate/2.1/RPMS/pcre-3.9-5.1.C21mdk.i586.rpm 16ff4bcf36bba60143ac847e0ce91cb0 corporate/2.1/SRPMS/pcre-3.9-5.1.C21mdk.src.rpm
Corporate Server 2.1/X86_64
d310322b1038159b0270ae62140e8b4c x86_64/corporate/2.1/RPMS/libpcre0-3.9-5.1.C21mdk.x86_64.rpm 7977cc9ab34756f1653e96e996abdfb4 x86_64/corporate/2.1/RPMS/libpcre0-devel-3.9-5.1.C21mdk.x86_64.rpm aad833aca80deac98d7157de58a9ef68 x86_64/corporate/2.1/RPMS/pcre-3.9-5.1.C21mdk.x86_64.rpm 16ff4bcf36bba60143ac847e0ce91cb0 x86_64/corporate/2.1/SRPMS/pcre-3.9-5.1.C21mdk.src.rpm
Corporate Server 3.0
18dd263d0c809022c870a29899eeb8b3 corporate/3.0/RPMS/libpcre0-4.5-3.2.C30mdk.i586.rpm 674b5bba9b87dc2ed6e6fafe9c53abfc corporate/3.0/RPMS/libpcre0-devel-4.5-3.2.C30mdk.i586.rpm d5df129d1e9d7800e1b9a97cccb96217 corporate/3.0/RPMS/pcre-4.5-3.2.C30mdk.i586.rpm e9f3f1d4a19b0396481871aa0c398c16 corporate/3.0/SRPMS/pcre-4.5-3.2.C30mdk.src.rpm
Corporate Server 3.0/X86_64
a5a97684dac58a4bce9748039c961278 x86_64/corporate/3.0/RPMS/lib64pcre0-4.5-3.2.C30mdk.x86_64.rpm d1dcd3f60940c3165d42b79c631b558d x86_64/corporate/3.0/RPMS/lib64pcre0-devel-4.5-3.2.C30mdk.x86_64.rpm bc0dae706980d75df70c6080cb1968a4 x86_64/corporate/3.0/RPMS/pcre-4.5-3.2.C30mdk.x86_64.rpm e9f3f1d4a19b0396481871aa0c398c16 x86_64/corporate/3.0/SRPMS/pcre-4.5-3.2.C30mdk.src.rpm
Multi Network Firewall 2.0
39a7d2f6d40af5ca22b7a78607b3217f mnf/2.0/RPMS/libpcre0-4.5-3.1.M20mdk.i586.rpm de30c5803f323b1b124234c21f125b25 mnf/2.0/RPMS/pcre-4.5-3.1.M20mdk.i586.rpm 6c8e57198db4380e69017f8299ff40e5 mnf/2.0/SRPMS/pcre-4.5-3.1.M20mdk.src.rpm
Mandriva Linux LE2005
4b3dcaf88712905c07eb9d1eea48f426 10.2/RPMS/libpcre0-5.0-2.1.102mdk.i586.rpm 93f5253396e53c95b5aebb79a290957c 10.2/RPMS/libpcre0-devel-5.0-2.1.102mdk.i586.rpm c42b2c321aacd8fc36aaed195aaed054 10.2/RPMS/pcre-5.0-2.1.102mdk.i586.rpm c9bd1f6fd2816a6ff02c08533faa700a 10.2/SRPMS/pcre-5.0-2.1.102mdk.src.rpm
Mandriva Linux LE2005/X86_64
9c16f12aec35bc1d32932ecf478e0672 x86_64/10.2/RPMS/lib64pcre0-5.0-2.1.102mdk.x86_64.rpm 93ff357fa977d8a26ac5a4a0ef2b6400 x86_64/10.2/RPMS/lib64pcre0-devel-5.0-2.1.102mdk.x86_64.rpm a2ceb2799814de8984ca6707b497fce5 x86_64/10.2/RPMS/pcre-5.0-2.1.102mdk.x86_64.rpm c9bd1f6fd2816a6ff02c08533faa700a x86_64/10.2/SRPMS/pcre-5.0-2.1.102mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.