Secunia Security Advisory - Mandriva has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.
8483f3ed259a0df60fac68c271554b21088b23f12c419eb3f82905ac607f3f65
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
https://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Mandriva update for pcre
SECUNIA ADVISORY ID:
SA16581
VERIFY ADVISORY:
https://secunia.com/advisories/16581/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From remote
OPERATING SYSTEM:
Mandrakelinux 10.1
https://secunia.com/product/4198/
Mandrakelinux 10.0
https://secunia.com/product/3918/
Mandrake Corporate Server 2.x
https://secunia.com/product/1222/
DESCRIPTION:
Mandriva has issued an update for pcre. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise
a vulnerable system.
For more information:
SA16502
SOLUTION:
Apply updated packages.
Mandrakelinux 10.0
309b57502a08710bc746463e40564c2e
10.0/RPMS/libpcre0-4.5-3.1.100mdk.i586.rpm
a7f390ea8291db6a913db92434ab4fd1
10.0/RPMS/libpcre0-devel-4.5-3.1.100mdk.i586.rpm
e7ad5f3caae546bc9f76d90c53d98131
10.0/RPMS/pcre-4.5-3.1.100mdk.i586.rpm
e832acf199d237eb25869d3e1dd1f3a5
10.0/SRPMS/pcre-4.5-3.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64
5ec78978882ae59e235036f463caf728
amd64/10.0/RPMS/lib64pcre0-4.5-3.1.100mdk.amd64.rpm
c1ea77b8c96a64de277200642c0f39c4
amd64/10.0/RPMS/lib64pcre0-devel-4.5-3.1.100mdk.amd64.rpm
459960f18b926090eccfbae6faa0c84f
amd64/10.0/RPMS/pcre-4.5-3.1.100mdk.amd64.rpm
e832acf199d237eb25869d3e1dd1f3a5
amd64/10.0/SRPMS/pcre-4.5-3.1.100mdk.src.rpm
Mandrakelinux 10.1
5fb1ddf8ac2ed8bb2268bf3e18b64529
10.1/RPMS/libpcre0-4.5-5.1.101mdk.i586.rpm
819b1b79f017971f145b8c12b78cc593
10.1/RPMS/libpcre0-devel-4.5-5.1.101mdk.i586.rpm
acb97853ce1673ad72027ff5057428c0
10.1/RPMS/pcre-4.5-5.1.101mdk.i586.rpm
f4a2d968098de33876cc7ad022f4e751
10.1/SRPMS/pcre-4.5-5.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64
03249093a10cb990ec3cc5a362924841
x86_64/10.1/RPMS/lib64pcre0-4.5-5.1.101mdk.x86_64.rpm
f74eadbea48228c62d1093622c6e9bb9
x86_64/10.1/RPMS/lib64pcre0-devel-4.5-5.1.101mdk.x86_64.rpm
1a0c903d0391d7f935786a84d2fa66eb
x86_64/10.1/RPMS/pcre-4.5-5.1.101mdk.x86_64.rpm
f4a2d968098de33876cc7ad022f4e751
x86_64/10.1/SRPMS/pcre-4.5-5.1.101mdk.src.rpm
Corporate Server 2.1
de01932f1bb779c78999762bb5057653
corporate/2.1/RPMS/libpcre0-3.9-5.1.C21mdk.i586.rpm
2a7c71195755079fe3eee0fda834a7d9
corporate/2.1/RPMS/libpcre0-devel-3.9-5.1.C21mdk.i586.rpm
aae9df225a2bdafa9f60feeb397f5796
corporate/2.1/RPMS/pcre-3.9-5.1.C21mdk.i586.rpm
16ff4bcf36bba60143ac847e0ce91cb0
corporate/2.1/SRPMS/pcre-3.9-5.1.C21mdk.src.rpm
Corporate Server 2.1/X86_64
d310322b1038159b0270ae62140e8b4c
x86_64/corporate/2.1/RPMS/libpcre0-3.9-5.1.C21mdk.x86_64.rpm
7977cc9ab34756f1653e96e996abdfb4
x86_64/corporate/2.1/RPMS/libpcre0-devel-3.9-5.1.C21mdk.x86_64.rpm
aad833aca80deac98d7157de58a9ef68
x86_64/corporate/2.1/RPMS/pcre-3.9-5.1.C21mdk.x86_64.rpm
16ff4bcf36bba60143ac847e0ce91cb0
x86_64/corporate/2.1/SRPMS/pcre-3.9-5.1.C21mdk.src.rpm
ORIGINAL ADVISORY:
https://www.mandriva.com/security/advisories?name=MDKSA-2005:151
OTHER REFERENCES:
SA16502:
https://secunia.com/advisories/16502/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------