You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa httpd

Sigurnosni nedostaci programskog paketa httpd

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-17195
2014-12-18 04:57:59
——————————————————————————–

Name : httpd
Product : Fedora 21
Version : 2.4.10
Release : 15.fc21
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

——————————————————————————–
Update Information:

– core: fix bypassing of mod_headers rules via chunked requests (CVE-2013-5704)
– mod_cache: fix NULL pointer dereference on empty Content-Type (CVE-2014-3581)
– mod_proxy_fcgi: fix a potential crash with long headers (CVE-2014-3583)
– mod_lua: fix handling of the Require line when a LuaAuthzProvider is used in multiple Require directives with different arguments (CVE-2014-8109)

——————————————————————————–
ChangeLog:

* Wed Dec 17 2014 Jan Kaluza <jkaluza@redhat.com> – 2.4.10-15
– core: fix bypassing of mod_headers rules via chunked requests (CVE-2013-5704)
– mod_cache: fix NULL pointer dereference on empty Content-Type (CVE-2014-3581)
– mod_proxy_fcgi: fix a potential crash with long headers (CVE-2014-3583)
– mod_lua: fix handling of the Require line when a LuaAuthzProvider is used
in multiple Require directives with different arguments (CVE-2014-8109)
* Tue Oct 14 2014 Joe Orton <jorton@redhat.com> – 2.4.10-14
– require apr-util 1.5.x
* Thu Sep 18 2014 Jan Kaluza <jkaluza@redhat.com> – 2.4.10-13
– use NoDelay and DeferAcceptSec in httpd.socket
——————————————————————————–
References:

[ 1 ] Bug #1082903 – CVE-2013-5704 httpd: bypass of mod_headers rules via chunked requests
https://bugzilla.redhat.com/show_bug.cgi?id=1082903
[ 2 ] Bug #1149709 – CVE-2014-3581 httpd: NULL pointer dereference in mod_cache if Content-Type has empty value
https://bugzilla.redhat.com/show_bug.cgi?id=1149709
[ 3 ] Bug #1163555 – CVE-2014-3583 httpd: mod_proxy_fcgi handle_headers() buffer over read
https://bugzilla.redhat.com/show_bug.cgi?id=1163555
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update httpd’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2015-03-0037-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni propust programskog paketa cups-filters

Ustanovljen je sigurnosni propust kod programskog paketa cups-filters uzrokovan neuspješnom obradom unesenih mrežnih parametara prilikom stvaranja skripti IPP ispisivača. Propust...

Close