You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa httpd

Sigurnosni nedostaci programskog paketa httpd

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-11689
2015-07-17 23:25:57
——————————————————————————–

Name : httpd
Product : Fedora 22
Version : 2.4.16
Release : 1.fc22
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

——————————————————————————–
Update Information:

Update to new version 2.4.16. This update fixed various bugs as well as few security issues.

For full changelog, see http://www.apache.org/dist/httpd/CHANGES_2.4.16
——————————————————————————–
ChangeLog:

* Wed Jul 15 2015 Jan Kaluza <jkaluza@redhat.com> – 2.4.12-4
– update to 2.4.16
* Tue Jul 7 2015 Joe Orton <jorton@redhat.com> – 2.4.12-3
– mod_ssl: use “localhost” in the dummy SSL cert if len(FQDN) > 59 chars
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 2.4.12-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1243887 – CVE-2015-3183 httpd: chunk header parsing defect
https://bugzilla.redhat.com/show_bug.cgi?id=1243887
[ 2 ] Bug #1243888 – CVE-2015-3185 httpd: replacement of ap_some_auth_required with new ap_some_authn_required and ap_force_authn
https://bugzilla.redhat.com/show_bug.cgi?id=1243888
[ 3 ] Bug #1243891 – CVE-2015-0253 httpd: a crash with ErrorDocument 400 pointing to a local URL-path
https://bugzilla.redhat.com/show_bug.cgi?id=1243891
[ 4 ] Bug #1202988 – CVE-2015-0228 httpd: Possible mod_lua crash due to websocket bug
https://bugzilla.redhat.com/show_bug.cgi?id=1202988
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update httpd’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

 

 

 

 

——————————————————————————–
Fedora Update Notification
FEDORA-2015-11792
2015-07-17 23:30:36
——————————————————————————–

Name : httpd
Product : Fedora 21
Version : 2.4.16
Release : 1.fc21
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

——————————————————————————–
Update Information:

Update to new version 2.4.16. This update fixed various bugs as well as few security issues.

For full changelog, see http://www.apache.org/dist/httpd/CHANGES_2.4.16
——————————————————————————–
ChangeLog:

* Fri Jul 17 2015 Jan Kaluza <jkaluza@redhat.com> – 2.4.16-1
– update to new version 2.4.16
* Fri May 29 2015 Jan Kaluza <jkaluza@redhat.com> – 2.4.12-1
– update to new version 2.4.12
* Wed Dec 17 2014 Jan Kaluza <jkaluza@redhat.com> – 2.4.10-15
– core: fix bypassing of mod_headers rules via chunked requests (CVE-2013-5704)
– mod_cache: fix NULL pointer dereference on empty Content-Type (CVE-2014-3581)
– mod_proxy_fcgi: fix a potential crash with long headers (CVE-2014-3583)
– mod_lua: fix handling of the Require line when a LuaAuthzProvider is used
in multiple Require directives with different arguments (CVE-2014-8109)
* Tue Oct 14 2014 Joe Orton <jorton@redhat.com> – 2.4.10-14
– require apr-util 1.5.x
* Thu Sep 18 2014 Jan Kaluza <jkaluza@redhat.com> – 2.4.10-13
– use NoDelay and DeferAcceptSec in httpd.socket
——————————————————————————–
References:

[ 1 ] Bug #1243887 – CVE-2015-3183 httpd: chunk header parsing defect
https://bugzilla.redhat.com/show_bug.cgi?id=1243887
[ 2 ] Bug #1243888 – CVE-2015-3185 httpd: replacement of ap_some_auth_required with new ap_some_authn_required and ap_force_authn
https://bugzilla.redhat.com/show_bug.cgi?id=1243888
[ 3 ] Bug #1243891 – CVE-2015-0253 httpd: NULL pointer dereference crash with ErrorDocument 400 pointing to a local URL-path
https://bugzilla.redhat.com/show_bug.cgi?id=1243891
[ 4 ] Bug #1202988 – CVE-2015-0228 httpd: Possible mod_lua crash due to websocket bug
https://bugzilla.redhat.com/show_bug.cgi?id=1202988
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update httpd’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

 

AutorMarijo Plepelic
Cert idNCERT-REF-2015-07-0003-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa asterisk

Otkriven je sigurnosni nedostatak u programskom paketu asterisk za operacijski sustav Fedora 22. Otkriveni nedostatak je posljedica neispravne provjere certifikata...

Close