Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in httpd
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in httpd
ID: FEDORA-2012-1598
Distribution: Fedora
Plattformen: Fedora 16
Datum: Di, 21. Februar 2012, 10:40
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
Applikationen: Apache

Originalnachricht

Name        : httpd
Product : Fedora 16
Version : 2.2.22
Release : 1.fc16
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

-------------------------------------------------------------------------------
-
Update Information:

This update contains the latest stable release of the Apace HTTP Server,
version 2.2.22. This release fixes various bugs, and the following security issues:

* Reject requests where the request-URI does not match the HTTP specification,
preventing unexpected expansion of target URLs in some reverse proxy configurations. (CVE-2011-3368)

* Fix integer overflow in ap_pregsub() which, when the mod_setenvif module is
enabled, could allow local users to gain privileges via a .htaccess file. (CVE-2011-3607)

* Resolve additional cases of URL rewriting with ProxyPassMatch or RewriteRule,
where particular request-URIs could result in undesired backend network exposure in some configurations. (CVE-2011-4317)

* mod_log_config: Fix segfault (crash) when the '%{cookiename}C' log
format string is in use and a client sends a nameless, valueless cookie, causing a denial of service. The issue existed since version 2.2.17. (CVE-2012-0021)

* Fix scoreboard issue which could allow an unprivileged child process could
cause the parent to crash at shutdown rather than terminate cleanly. (CVE-2012-0031)

* Fixed an issue in error responses that could expose "httpOnly"
cookies when no custom ErrorDocument is specified for status code 400. (CVE-2012-0053)

http://www.apache.org/dist/httpd/CHANGES_2.2.22
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Feb 13 2012 Joe Orton <jorton@redhat.com> - 2.2.22-1
- update to 2.2.22
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #785070 - CVE-2011-3368 CVE-2012-0053 CVE-2012-0031 CVE-2012-0021
CVE-2011-3607 httpd: multiple vulnerabilities [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=785070
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update httpd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung