You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa lighttpd

Sigurnosni nedostaci programskog paketa lighttpd

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-2506
2014-02-14 06:35:04
——————————————————————————–

Name : lighttpd
Product : Fedora 19
Version : 1.4.34
Release : 3.fc19
URL : http://www.lighttpd.net/
Summary : Lightning fast webserver with light system requirements
Description :
Secure, fast, compliant and very flexible web-server which has been optimized
for high-performance environments. It has a very low memory footprint compared
to other webservers and takes care of cpu-load. Its advanced feature-set
(FastCGI, CGI, Auth, Output-Compression, URL-Rewriting and many more) make
it the perfect webserver-software for every server that is suffering load
problems.

——————————————————————————–
Update Information:

Enable building with PIE
Latest upstream, multiple security fixes.

http://www.lighttpd.net/2014/1/20/1-4-34/
Latest upstream, multiple security fixes.

http://www.lighttpd.net/2014/1/20/1-4-34/
——————————————————————————–
ChangeLog:

* Mon Feb 10 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-3
– Enable PIE, BZ 955145.
* Mon Feb 10 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-2
– Apply Ken Dreyer’s spec patches from BZ 850188.
* Wed Feb 5 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-1
– 1.4.34, multiple security fixes.
* Mon Aug 26 2013 Jon Ciesla <limburgher@gmail.com> – 1.4.32-1
– Update to 1.4.32, BZ 878915.
* Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 1.4.31-4
– Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #955145 – lighttpd package should be built with PIE flags
https://bugzilla.redhat.com/show_bug.cgi?id=955145
[ 2 ] Bug #1029667 – CVE-2013-4560 CVE-2013-4559 lighttpd: various flaws [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1029667
[ 3 ] Bug #994444 – 1.4.31 contains a severe DOS attack point
https://bugzilla.redhat.com/show_bug.cgi?id=994444
[ 4 ] Bug #879185 – lighttpd-1.4.34 is available
https://bugzilla.redhat.com/show_bug.cgi?id=879185
[ 5 ] Bug #1026567 – CVE-2013-4508 lighttpd: uses vulnerable cipher suites when SNI is used [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1026567
[ 6 ] Bug #1026568 – CVE-2013-4508 lighttpd: uses vulnerable cipher suites when SNI is used [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1026568
[ 7 ] Bug #1029666 – CVE-2013-4560 CVE-2013-4559 lighttpd: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1029666
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update lighttpd’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-2495
2014-02-14 06:34:38
——————————————————————————–

Name : lighttpd
Product : Fedora 20
Version : 1.4.34
Release : 3.fc20
URL : http://www.lighttpd.net/
Summary : Lightning fast webserver with light system requirements
Description :
Secure, fast, compliant and very flexible web-server which has been optimized
for high-performance environments. It has a very low memory footprint compared
to other webservers and takes care of cpu-load. Its advanced feature-set
(FastCGI, CGI, Auth, Output-Compression, URL-Rewriting and many more) make
it the perfect webserver-software for every server that is suffering load
problems.

——————————————————————————–
Update Information:

Enable building with PIE
Latest upstream, multiple security fixes.

http://www.lighttpd.net/2014/1/20/1-4-34/
Latest upstream, multiple security fixes.

http://www.lighttpd.net/2014/1/20/1-4-34/
——————————————————————————–
ChangeLog:

* Mon Feb 10 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-3
– Enable PIE, BZ 955145.
* Mon Feb 10 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-2
– Apply Ken Dreyer’s spec patches from BZ 850188.
* Wed Feb 5 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-1
– 1.4.34, multiple security fixes.
——————————————————————————–
References:

[ 1 ] Bug #955145 – lighttpd package should be built with PIE flags
https://bugzilla.redhat.com/show_bug.cgi?id=955145
[ 2 ] Bug #1029667 – CVE-2013-4560 CVE-2013-4559 lighttpd: various flaws [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1029667
[ 3 ] Bug #994444 – 1.4.31 contains a severe DOS attack point
https://bugzilla.redhat.com/show_bug.cgi?id=994444
[ 4 ] Bug #879185 – lighttpd-1.4.34 is available
https://bugzilla.redhat.com/show_bug.cgi?id=879185
[ 5 ] Bug #1026567 – CVE-2013-4508 lighttpd: uses vulnerable cipher suites when SNI is used [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1026567
[ 6 ] Bug #1026568 – CVE-2013-4508 lighttpd: uses vulnerable cipher suites when SNI is used [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1026568
[ 7 ] Bug #1029666 – CVE-2013-4560 CVE-2013-4559 lighttpd: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1029666
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update lighttpd’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarijo Plepelic
Cert idNCERT-REF-2014-02-0003-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa xstream

Otkriven je sigurnosni nedostatak u programskom paketu xstream. Otkriveni nedostatak se javlja zbog nesigurne deserijalizacije XML koda što potencijalnim napadačima...

Close