User: Password:
|
|
Subscribe / Log in / New account

openSUSE alert openSUSE-SU-2014:0969-1 (apache)

From:  opensuse-security@opensuse.org
To:  opensuse-updates@opensuse.org
Subject:  openSUSE-SU-2014:0969-1: important: security issues addressed, most notably the mod_security heap overflow known as CVE-2014-0226
Date:  Thu, 7 Aug 2014 23:04:14 +0200 (CEST)
Message-ID:  <20140807210414.E8C67320B7@maintenance.suse.de>

openSUSE Security Update: security issues addressed, most notably the mod_security heap overflow known as CVE-2014-0226 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:0969-1 Rating: important References: #859916 #869105 #869106 #871309 #887765 #887768 Cross-References: CVE-2013-5705 CVE-2013-6438 CVE-2014-0098 CVE-2014-0226 CVE-2014-0231 Affected Products: openSUSE 11.4 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has one errata is now available. Description: apache2: - ECC support was added to mod_ssl - fix for a race condition in mod_status known as CVE-2014-0226 can lead to information disclosure; mod_status is not active by default, and is normally only open for connects from localhost. - fix for bug known as CVE-2014-0098 that can crash the apache process if a specially designed cookie is sent to the server (log_cookie.c) - fix for crash bug in mod_dav known as CVE-2013-6438 - fix for a problem with non-responsive CGI scripts that would otherwise cause the server to stall and deny service. CVE-2014-0231, new configuration parameter CGIDScriptTimeout defaults to 60s. apache2-mod_security2: - specially drafted chunked http requests allow an attacker to bypass filters configured in mod_security2. This vulnerability is known as CVE-2013-5705. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch 2014-72 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): apache2-2.2.17-80.1 apache2-debuginfo-2.2.17-80.1 apache2-debugsource-2.2.17-80.1 apache2-devel-2.2.17-80.1 apache2-event-2.2.17-80.1 apache2-event-debuginfo-2.2.17-80.1 apache2-example-certificates-2.2.17-80.1 apache2-example-pages-2.2.17-80.1 apache2-itk-2.2.17-80.1 apache2-itk-debuginfo-2.2.17-80.1 apache2-mod_security2-2.7.5-16.1 apache2-mod_security2-debuginfo-2.7.5-16.1 apache2-mod_security2-debugsource-2.7.5-16.1 apache2-prefork-2.2.17-80.1 apache2-prefork-debuginfo-2.2.17-80.1 apache2-utils-2.2.17-80.1 apache2-utils-debuginfo-2.2.17-80.1 apache2-worker-2.2.17-80.1 apache2-worker-debuginfo-2.2.17-80.1 - openSUSE 11.4 (noarch): apache2-doc-2.2.17-80.1 References: http://support.novell.com/security/cve/CVE-2013-5705.html http://support.novell.com/security/cve/CVE-2013-6438.html http://support.novell.com/security/cve/CVE-2014-0098.html http://support.novell.com/security/cve/CVE-2014-0226.html http://support.novell.com/security/cve/CVE-2014-0231.html https://bugzilla.novell.com/859916 https://bugzilla.novell.com/869105 https://bugzilla.novell.com/869106 https://bugzilla.novell.com/871309 https://bugzilla.novell.com/887765 https://bugzilla.novell.com/887768


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds