Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in httpd
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in httpd
ID: FEDORA-2014-17195
Distribution: Fedora
Plattformen: Fedora 21
Datum: Mo, 16. März 2015, 07:05
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109

Originalnachricht

Name        : httpd
Product : Fedora 21
Version : 2.4.10
Release : 15.fc21
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

-------------------------------------------------------------------------------
-
Update Information:

- core: fix bypassing of mod_headers rules via chunked requests
(CVE-2013-5704)
- mod_cache: fix NULL pointer dereference on empty Content-Type
(CVE-2014-3581)
- mod_proxy_fcgi: fix a potential crash with long headers (CVE-2014-3583)
- mod_lua: fix handling of the Require line when a LuaAuthzProvider is used in
multiple Require directives with different arguments (CVE-2014-8109)

-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Dec 17 2014 Jan Kaluza <jkaluza@redhat.com> - 2.4.10-15
- core: fix bypassing of mod_headers rules via chunked requests (CVE-2013-5704)
- mod_cache: fix NULL pointer dereference on empty Content-Type (CVE-2014-3581)
- mod_proxy_fcgi: fix a potential crash with long headers (CVE-2014-3583)
- mod_lua: fix handling of the Require line when a LuaAuthzProvider is used
in multiple Require directives with different arguments (CVE-2014-8109)
* Tue Oct 14 2014 Joe Orton <jorton@redhat.com> - 2.4.10-14
- require apr-util 1.5.x
* Thu Sep 18 2014 Jan Kaluza <jkaluza@redhat.com> - 2.4.10-13
- use NoDelay and DeferAcceptSec in httpd.socket
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1082903 - CVE-2013-5704 httpd: bypass of mod_headers rules via
chunked requests
https://bugzilla.redhat.com/show_bug.cgi?id=1082903
[ 2 ] Bug #1149709 - CVE-2014-3581 httpd: NULL pointer dereference in
mod_cache if Content-Type has empty value
https://bugzilla.redhat.com/show_bug.cgi?id=1149709
[ 3 ] Bug #1163555 - CVE-2014-3583 httpd: mod_proxy_fcgi handle_headers()
buffer over read
https://bugzilla.redhat.com/show_bug.cgi?id=1163555
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update httpd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung