-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:093 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : couchdb Date : May 16, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated couchdb packages fix security vulnerability: Apache CouchDB 1.5.0 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via the count parameter to /_uuids (CVE-2014-2668). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2668 http://advisories.mageia.org/MGASA-2014-0203.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: 71b2334df7e90a4d201c9f523dce27bf mbs1/x86_64/couchdb-1.2.1-1.1.mbs1.x86_64.rpm 0c9819953308d8bd023cb7161492b7e7 mbs1/x86_64/couchdb-bin-1.2.1-1.1.mbs1.x86_64.rpm ea84715d9db1e781132f0f7bc1861b6b mbs1/SRPMS/couchdb-1.2.1-1.1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFTddoymqjQ0CJFipgRAvYfAKCoiVaG5wOw4FTgKXJZKsb3/okfFACgpW27 rQPaMjctrBgDIR9iNWm2uEQ= =oZVN -----END PGP SIGNATURE-----