Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in mehreren Paketen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in mehreren Paketen
ID: openSUSE-SU-2014:0969-1
Distribution: SUSE
Plattformen: SUSE openSUSE 11.4
Datum: Do, 7. August 2014, 23:29
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
Applikationen: several

Originalnachricht

   openSUSE Security Update: security issues addressed, most notably the
mod_security heap overflow known as CVE-2014-0226
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0969-1
Rating: important
References: #859916 #869105 #869106 #871309 #887765 #887768

Cross-References: CVE-2013-5705 CVE-2013-6438 CVE-2014-0098
CVE-2014-0226 CVE-2014-0231
Affected Products:
openSUSE 11.4
______________________________________________________________________________

An update that solves 5 vulnerabilities and has one errata
is now available.

Description:

apache2:
- ECC support was added to mod_ssl
- fix for a race condition in mod_status known as CVE-2014-0226 can lead
to information disclosure; mod_status is not active by default, and is
normally only open for connects from localhost.
- fix for bug known as CVE-2014-0098 that can crash the apache process if
a specially designed cookie is sent to the server (log_cookie.c)
- fix for crash bug in mod_dav known as CVE-2013-6438
- fix for a problem with non-responsive CGI scripts that would otherwise
cause the server to stall and deny service. CVE-2014-0231, new
configuration parameter CGIDScriptTimeout defaults to 60s.

apache2-mod_security2:
- specially drafted chunked http requests allow an attacker to bypass
filters configured in mod_security2. This vulnerability is known as
CVE-2013-5705.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch 2014-72

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64):

apache2-2.2.17-80.1
apache2-debuginfo-2.2.17-80.1
apache2-debugsource-2.2.17-80.1
apache2-devel-2.2.17-80.1
apache2-event-2.2.17-80.1
apache2-event-debuginfo-2.2.17-80.1
apache2-example-certificates-2.2.17-80.1
apache2-example-pages-2.2.17-80.1
apache2-itk-2.2.17-80.1
apache2-itk-debuginfo-2.2.17-80.1
apache2-mod_security2-2.7.5-16.1
apache2-mod_security2-debuginfo-2.7.5-16.1
apache2-mod_security2-debugsource-2.7.5-16.1
apache2-prefork-2.2.17-80.1
apache2-prefork-debuginfo-2.2.17-80.1
apache2-utils-2.2.17-80.1
apache2-utils-debuginfo-2.2.17-80.1
apache2-worker-2.2.17-80.1
apache2-worker-debuginfo-2.2.17-80.1

- openSUSE 11.4 (noarch):

apache2-doc-2.2.17-80.1


References:

http://support.novell.com/security/cve/CVE-2013-5705.html
http://support.novell.com/security/cve/CVE-2013-6438.html
http://support.novell.com/security/cve/CVE-2014-0098.html
http://support.novell.com/security/cve/CVE-2014-0226.html
http://support.novell.com/security/cve/CVE-2014-0231.html
https://bugzilla.novell.com/859916
https://bugzilla.novell.com/869105
https://bugzilla.novell.com/869106
https://bugzilla.novell.com/871309
https://bugzilla.novell.com/887765
https://bugzilla.novell.com/887768

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung