You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa apache2

Sigurnosni nedostaci programskog paketa apache2

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for apache2
______________________________________________________________________________

Announcement ID: SUSE-SU-2014:1080-1
Rating: important
References: #859916 #869105 #869106 #887765 #887768
Cross-References: CVE-2013-6438 CVE-2014-0098 CVE-2014-0226
CVE-2014-0231
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This apache2 update fixes the following security and non security issues:

* mod_cgid denial of service (CVE-2014-0231, bnc#887768)
* mod_status heap-based buffer overflow (CVE-2014-0226, bnc#887765)
* mod_dav denial of service (CVE-2013-6438, bnc#869105)
* log_cookie mod_log_config.c remote denial of service (CVE-2014-0098,
bnc#869106)
* Support ECDH in Apache2 (bnc#859916)

Security Issues:

* CVE-2014-0098
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098>
* CVE-2013-6438
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438>
* CVE-2014-0226
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226>
* CVE-2014-0231
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231>

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 11 SP2 LTSS:

zypper in -t patch slessp2-apache2-9620

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):

apache2-2.2.12-1.48.1
apache2-doc-2.2.12-1.48.1
apache2-example-pages-2.2.12-1.48.1
apache2-prefork-2.2.12-1.48.1
apache2-utils-2.2.12-1.48.1
apache2-worker-2.2.12-1.48.1

References:

http://support.novell.com/security/cve/CVE-2013-6438.html
http://support.novell.com/security/cve/CVE-2014-0098.html
http://support.novell.com/security/cve/CVE-2014-0226.html
http://support.novell.com/security/cve/CVE-2014-0231.html
https://bugzilla.novell.com/859916
https://bugzilla.novell.com/869105
https://bugzilla.novell.com/869106
https://bugzilla.novell.com/887765
https://bugzilla.novell.com/887768
http://download.suse.com/patch/finder/?keywords=9a43c85d7b1016ad740a0769515661cb


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for apache2
______________________________________________________________________________

Announcement ID: SUSE-SU-2014:1081-1
Rating: important
References: #852401 #859916 #869105 #869106 #887765 #887768

Cross-References: CVE-2013-6438 CVE-2014-0098 CVE-2014-0226
CVE-2014-0231
Affected Products:
SUSE Linux Enterprise Server 11 SP1 LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has two
fixes is now available. It includes one version update.

Description:

This apache2 update fixes the following security and non-security issues:

* mod_cgid denial of service (CVE-2014-0231, bnc#887768)
* mod_status heap-based buffer overflow (CVE-2014-0226, bnc#887765)
* mod_dav denial of service (CVE-2013-6438, bnc#869105)
* log_cookie mod_log_config.c remote denial of service (CVE-2014-0098,
bnc#869106)
* Support ECDH in Apache2 (bnc#859916)
* apache fails to start with SSL on Xen kernel at boot time
(bnc#852401)

Security Issues:

* CVE-2014-0098
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098>
* CVE-2013-6438
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438>
* CVE-2014-0226
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226>
* CVE-2014-0231
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231>

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 11 SP1 LTSS:

zypper in -t patch slessp1-apache2-9619

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 2.2.12]:

apache2-2.2.12-1.48.1
apache2-doc-2.2.12-1.48.1
apache2-example-pages-2.2.12-1.48.1
apache2-prefork-2.2.12-1.48.1
apache2-utils-2.2.12-1.48.1
apache2-worker-2.2.12-1.48.1

References:

http://support.novell.com/security/cve/CVE-2013-6438.html
http://support.novell.com/security/cve/CVE-2014-0098.html
http://support.novell.com/security/cve/CVE-2014-0226.html
http://support.novell.com/security/cve/CVE-2014-0231.html
https://bugzilla.novell.com/852401
https://bugzilla.novell.com/859916
https://bugzilla.novell.com/869105
https://bugzilla.novell.com/869106
https://bugzilla.novell.com/887765
https://bugzilla.novell.com/887768
http://download.suse.com/patch/finder/?keywords=9c5ea88101bc5060dd62e74ff4f50214


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for apache2
______________________________________________________________________________

Announcement ID: SUSE-SU-2014:1082-1
Rating: important
References: #829056 #829057 #869105 #869106 #887765 #887768

Cross-References: CVE-2013-1862 CVE-2013-1896 CVE-2013-6438
CVE-2014-0098 CVE-2014-0226 CVE-2014-0231

Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This apache2 update fixes the following security issues:

* log_cookie mod_log_config.c remote denial of service (CVE-2014-0098,
bnc#869106)
* mod_dav denial of service (CVE-2013-6438, bnc#869105)
* mod_cgid denial of service (CVE-2014-0231, bnc#887768)
* mod_status heap-based buffer overflow (CVE-2014-0226, bnc#887765)
* mod_rewrite: escape logdata to avoid terminal escapes
(CVE-2013-1862, bnc#829057)
* mod_dav: segfault in merge request (CVE-2013-1896, bnc#829056)

Security Issues:

* CVE-2014-0098
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098>
* CVE-2013-6438
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438>
* CVE-2014-0226
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226>
* CVE-2014-0231
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231>
* CVE-2013-1862
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862>
* CVE-2013-1896
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896>

Package List:

– SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):

apache2-2.2.3-16.50.1
apache2-devel-2.2.3-16.50.1
apache2-doc-2.2.3-16.50.1
apache2-example-pages-2.2.3-16.50.1
apache2-prefork-2.2.3-16.50.1
apache2-worker-2.2.3-16.50.1

– SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):

apache2-2.2.3-16.32.51.2
apache2-devel-2.2.3-16.32.51.2
apache2-doc-2.2.3-16.32.51.2
apache2-example-pages-2.2.3-16.32.51.2
apache2-prefork-2.2.3-16.32.51.2
apache2-worker-2.2.3-16.32.51.2

References:

http://support.novell.com/security/cve/CVE-2013-1862.html
http://support.novell.com/security/cve/CVE-2013-1896.html
http://support.novell.com/security/cve/CVE-2013-6438.html
http://support.novell.com/security/cve/CVE-2014-0098.html
http://support.novell.com/security/cve/CVE-2014-0226.html
http://support.novell.com/security/cve/CVE-2014-0231.html
https://bugzilla.novell.com/829056
https://bugzilla.novell.com/829057
https://bugzilla.novell.com/869105
https://bugzilla.novell.com/869106
https://bugzilla.novell.com/887765
https://bugzilla.novell.com/887768
http://download.suse.com/patch/finder/?keywords=0593c1f59d8a810c00150b05cea3af2f
http://download.suse.com/patch/finder/?keywords=0ddc907bde6fcbad1e94944d867f60dd


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorMarko Stanec
Cert idNCERT-REF-2014-09-0010-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa oxide-qt

Otkriveni su sigurnosni nedostaci u programskom paketu oxide-qt za Ubuntu 14.04 LTS. Otkriveni nedostaci potencijalnim napadačima omogućuju pokretanje proizvoljnog programskog...

Close