Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in httpd
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in httpd
ID: FEDORA-2012-1642
Distribution: Fedora
Plattformen: Fedora 15
Datum: Di, 6. März 2012, 23:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
Applikationen: Apache

Originalnachricht

Name        : httpd
Product : Fedora 15
Version : 2.2.22
Release : 1.fc15
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

-------------------------------------------------------------------------------
-
Update Information:

This update contains the latest stable release of the Apace HTTP Server,
version 2.2.22. This release fixes various bugs, and the following security issues:

* Reject requests where the request-URI does not match the HTTP specification,
preventing unexpected expansion of target URLs in some reverse proxy configurations. (CVE-2011-3368)

* Fix integer overflow in ap_pregsub() which, when the mod_setenvif module is
enabled, could allow local users to gain privileges via a .htaccess file. (CVE-2011-3607)

* Resolve additional cases of URL rewriting with ProxyPassMatch or RewriteRule,
where particular request-URIs could result in undesired backend network exposure in some configurations. (CVE-2011-4317)

* mod_log_config: Fix segfault (crash) when the '%{cookiename}C' log
format string is in use and a client sends a nameless, valueless cookie, causing a denial of service. The issue existed since version 2.2.17. (CVE-2012-0021)

* Fix scoreboard issue which could allow an unprivileged child process could
cause the parent to crash at shutdown rather than terminate cleanly. (CVE-2012-0031)

* Fixed an issue in error responses that could expose "httpOnly"
cookies when no custom ErrorDocument is specified for status code 400. (CVE-2012-0053)

http://www.apache.org/dist/httpd/CHANGES_2.2.22
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Feb 13 2012 Joe Orton <jorton@redhat.com> - 2.2.22-1
- update to 2.2.22
* Tue Sep 13 2011 Joe Orton <jorton@redhat.com> - 2.2.21-1
- update to 2.2.21
- restore authnoprov patch (#736104)
* Wed Aug 10 2011 Jan Kaluza <jkaluza@redhat.com> - 2.2.19-5
- fix #707917 - add httpd-ssl-pass-dialog to ask for SSL password using systemd
* Wed Jul 20 2011 Jan Kaluza <jkaluza@redhat.com> - 2.2.19-2
- fix #716621 - suexec now works without setuid bit
- fix #689091 - backported patch from 2.3 branch to support IPv6 in logresolve
* Tue Jul 19 2011 Joe Orton <jorton@redhat.com> - 2.2.19-1
- update to 2.2.19
* Wed Mar 23 2011 Joe Orton <jorton@redhat.com> - 2.2.17-11
- minor updates to httpd.conf
- drop old patches
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #785070 - CVE-2011-3368 CVE-2012-0053 CVE-2012-0031 CVE-2012-0021
CVE-2011-3607 httpd: multiple vulnerabilities [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=785070
[ 2 ] Bug #787325 - Update httpd to 2.2.22 as CVE-2011-3368, CVE-2011-3607,
CVE-2011-4317, CVE-2012-0021, CVE-2012-0031, CVE-2012-0053 as well as bugfixes
https://bugzilla.redhat.com/show_bug.cgi?id=787325
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update httpd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung