Jump to content
Compatible Support Forums
Sign in to follow this  
news

[slackware-security] httpd (SSA:2014-204-01)

Recommended Posts

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

[slackware-security] httpd (SSA:2014-204-01)

 

New httpd packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,

and -current to fix security issues.

 

 

Here are the details from the Slackware 14.1 ChangeLog:

+--------------------------+

patches/packages/httpd-2.4.10-i486-1_slack14.1.txz: Upgraded.

This update fixes the following security issues:

*) SECURITY: CVE-2014-0117 (cve.mitre.org)

mod_proxy: Fix crash in Connection header handling which

allowed a denial of service attack against a reverse proxy

with a threaded MPM. [ben Reser]

*) SECURITY: CVE-2014-0118 (cve.mitre.org)

mod_deflate: The DEFLATE input filter (inflates request bodies) now

limits the length and compression ratio of inflated request bodies to

avoid denial of sevice via highly compressed bodies. See directives

DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,

and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]

*) SECURITY: CVE-2014-0226 (cve.mitre.org)

Fix a race condition in scoreboard handling, which could lead to

a heap buffer overflow. [Joe Orton, Eric Covener]

*) SECURITY: CVE-2014-0231 (cve.mitre.org)

mod_cgid: Fix a denial of service against CGI scripts that do

not consume stdin that could lead to lingering HTTPD child processes

filling up the scoreboard and eventually hanging the server. By

default, the client I/O timeout (Timeout directive) now applies to

communication with scripts. The CGIDScriptTimeout directive can be

used to set a different timeout for communication with scripts.

[Rainer Jung, Eric Covener, Yann Ylavic]

For more information, see:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231

(* Security fix *)

+--------------------------+

 

 

Where to find the new packages:

+-----------------------------+

 

Thanks to the friendly folks at the OSU Open Source Lab

(http://osuosl.org) for donating FTP and rsync hosting

to the Slackware project! :-)

 

Also see the "Get Slack" section on http://slackware.com for

additional mirror sites near you.

 

Updated package for Slackware 13.0:

ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/httpd-2.2.27-i486-1_slack13.0.txz

 

Updated package for Slackware x86_64 13.0:

ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/httpd-2.2.27-x86_64-1_slack13.0.txz

 

Updated package for Slackware 13.1:

ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/httpd-2.2.27-i486-1_slack13.1.txz

 

Updated package for Slackware x86_64 13.1:

ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/httpd-2.2.27-x86_64-1_slack13.1.txz

 

Updated package for Slackware 13.37:

ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/httpd-2.2.27-i486-1_slack13.37.txz

 

Updated package for Slackware x86_64 13.37:

ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/httpd-2.2.27-x86_64-1_slack13.37.txz

 

Updated package for Slackware 14.0:

ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.10-i486-1_slack14.0.txz

 

Updated package for Slackware x86_64 14.0:

ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.10-x86_64-1_slack14.0.txz

 

Updated package for Slackware 14.1:

ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/httpd-2.4.10-i486-1_slack14.1.txz

 

Updated package for Slackware x86_64 14.1:

ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/httpd-2.4.10-x86_64-1_slack14.1.txz

 

Updated package for Slackware -current:

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.10-i486-1.txz

 

Updated package for Slackware x86_64 -current:

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.10-x86_64-1.txz

 

 

MD5 signatures:

+-------------+

 

Slackware 13.0 package:

c79e696c379625efd18e6414f30dba80 httpd-2.2.27-i486-1_slack13.0.txz

 

Slackware x86_64 13.0 package:

28be181b3a0aae494371279230f190e9 httpd-2.2.27-x86_64-1_slack13.0.txz

 

Slackware 13.1 package:

fc409fff4d79cb1969a40756f8a9f576 httpd-2.2.27-i486-1_slack13.1.txz

 

Slackware x86_64 13.1 package:

07ab0f3337fc15656cd2e841c9b0eba4 httpd-2.2.27-x86_64-1_slack13.1.txz

 

Slackware 13.37 package:

b5cefd8903745aceaa68b482cb63e4e2 httpd-2.2.27-i486-1_slack13.37.txz

 

Slackware x86_64 13.37 package:

610a33703e7f84fd14f09bc9529c1cd5 httpd-2.2.27-x86_64-1_slack13.37.txz

 

Slackware 14.0 package:

d6dedc1064a6a4d039b188fed02de89b httpd-2.4.10-i486-1_slack14.0.txz

 

Slackware x86_64 14.0 package:

7d150bf3bd558bf70ea2c21a08a1b5b7 httpd-2.4.10-x86_64-1_slack14.0.txz

 

Slackware 14.1 package:

7e9b03930b0452a95595a61cf1b093d8 httpd-2.4.10-i486-1_slack14.1.txz

 

Slackware x86_64 14.1 package:

efc9893a3428d87a8d78787fbde793e0 httpd-2.4.10-x86_64-1_slack14.1.txz

 

Slackware -current package:

1ac5a4cc6275c8f7cfa6e3a77a27f2db n/httpd-2.4.10-i486-1.txz

 

Slackware x86_64 -current package:

7fa5fda601a324238f5a2768204a7476 n/httpd-2.4.10-x86_64-1.txz

 

 

Installation instructions:

+------------------------+

 

Upgrade the package as root:

# upgradepkg httpd-2.4.10-i486-1_slack14.1.txz

 

Then, restart Apache httpd:

 

# /etc/rc.d/rc.httpd stop

# /etc/rc.d/rc.httpd start

 

 

+-----+

 

Slackware Linux Security Team

http://slackware.com/gpg-key

security ( -at -) slackware.com

 

+------------------------------------------------------------------------+

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×