[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1MD5AD-0007cx-2F@titan.mandriva.com>
Date: Sun, 07 Jun 2009 01:19:01 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:131-1 ] apr-util
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:131-1
http://www.mandriva.com/security/
_______________________________________________________________________
Package : apr-util
Date : June 6, 2009
Affected: Corporate 3.0, Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
Multiple security vulnerabilities has been identified and fixed
in apr-util:
The apr_strmatch_precompile function in strmatch/apr_strmatch.c in
Apache APR-util before 1.3.5 allows remote attackers to cause a denial
of service (daemon crash) via crafted input involving (1) a .htaccess
file used with the Apache HTTP Server, (2) the SVNMasterURI directive
in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2
module for the Apache HTTP Server, or (4) an application that uses
the libapreq2 library, related to an underflow flaw. (CVE-2009-0023).
The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in
Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn
modules in the Apache HTTP Server, allows remote attackers to
cause a denial of service (memory consumption) via a crafted XML
document containing a large number of nested entity references, as
demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564
(CVE-2009-1955).
Off-by-one error in the apr_brigade_vprintf function in Apache APR-util
before 1.3.5 on big-endian platforms allows remote attackers to obtain
sensitive information or cause a denial of service (application crash)
via crafted input (CVE-2009-1956).
The updated packages have been patched to prevent this.
Update:
Fixed packages for CS3 and MNF2 was missing with the last update.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956
_______________________________________________________________________
Updated Packages:
Corporate 3.0:
6438073fa2571cedb2edcb8a695bda16 corporate/3.0/i586/apache2-2.0.48-6.20.C30mdk.i586.rpm
12e8afeabb65ea4abf905524fd61b343 corporate/3.0/i586/apache2-common-2.0.48-6.20.C30mdk.i586.rpm
4eadd42fb186a26d786d25362533e82a corporate/3.0/i586/apache2-devel-2.0.48-6.20.C30mdk.i586.rpm
832d9dbd5600782a929b71bd7e6f61bb corporate/3.0/i586/apache2-manual-2.0.48-6.20.C30mdk.i586.rpm
750c02cf0859b7b317f124c5107a5b07 corporate/3.0/i586/apache2-mod_cache-2.0.48-6.20.C30mdk.i586.rpm
9ed613802d3e5f8fc088b8465428f1d9 corporate/3.0/i586/apache2-mod_dav-2.0.48-6.20.C30mdk.i586.rpm
9030c9382a9d4d3020b8fd815cbabaa7 corporate/3.0/i586/apache2-mod_deflate-2.0.48-6.20.C30mdk.i586.rpm
8e98aa19ce3197ae31f870c84402e1ea corporate/3.0/i586/apache2-mod_disk_cache-2.0.48-6.20.C30mdk.i586.rpm
97233182b774c4350d05e4e7422aca65 corporate/3.0/i586/apache2-mod_file_cache-2.0.48-6.20.C30mdk.i586.rpm
40e47234eb2605375c5fc717659e0eae corporate/3.0/i586/apache2-mod_ldap-2.0.48-6.20.C30mdk.i586.rpm
80dfaf750009361fe621c594bec5efb7 corporate/3.0/i586/apache2-mod_mem_cache-2.0.48-6.20.C30mdk.i586.rpm
6573645bbb414f59115229207305a3f3 corporate/3.0/i586/apache2-mod_proxy-2.0.48-6.20.C30mdk.i586.rpm
612e933acc767970ecdf1f23e62c2ebf corporate/3.0/i586/apache2-mod_ssl-2.0.48-6.20.C30mdk.i586.rpm
dc00610fd6633f63f891c5f768a22acd corporate/3.0/i586/apache2-modules-2.0.48-6.20.C30mdk.i586.rpm
5241d3032ae49713e43d07d39fbbee04 corporate/3.0/i586/apache2-source-2.0.48-6.20.C30mdk.i586.rpm
34d3d434bc723130e6e59049b5e3939a corporate/3.0/i586/libapr0-2.0.48-6.20.C30mdk.i586.rpm
f048b454b9bf609c1cc7b13c413387d4 corporate/3.0/SRPMS/apache2-2.0.48-6.20.C30mdk.src.rpm
Corporate 3.0/X86_64:
755b2e066f779fa9aad5f403335e1f75 corporate/3.0/x86_64/apache2-2.0.48-6.20.C30mdk.x86_64.rpm
42bc30427c45df83d7a0fbb5bee60505 corporate/3.0/x86_64/apache2-common-2.0.48-6.20.C30mdk.x86_64.rpm
783174aa020c5b14095087172bade395 corporate/3.0/x86_64/apache2-devel-2.0.48-6.20.C30mdk.x86_64.rpm
4b54570bdb7f6aa29d370a9250a55450 corporate/3.0/x86_64/apache2-manual-2.0.48-6.20.C30mdk.x86_64.rpm
9fb862a630cc2fdddf5aadffc73d8f03 corporate/3.0/x86_64/apache2-mod_cache-2.0.48-6.20.C30mdk.x86_64.rpm
ce00089db719cc5fccf8c5ed614e0f86 corporate/3.0/x86_64/apache2-mod_dav-2.0.48-6.20.C30mdk.x86_64.rpm
6c7ce93e4faf3910a4e37ecfb3aa6bcf corporate/3.0/x86_64/apache2-mod_deflate-2.0.48-6.20.C30mdk.x86_64.rpm
084c2310ae92da6d58f2c2d9748ef947 corporate/3.0/x86_64/apache2-mod_disk_cache-2.0.48-6.20.C30mdk.x86_64.rpm
338bedc1f695ac29257f4fbbbae0e913 corporate/3.0/x86_64/apache2-mod_file_cache-2.0.48-6.20.C30mdk.x86_64.rpm
429fcecf3fa53ec73c1c2082a06c8a7b corporate/3.0/x86_64/apache2-mod_ldap-2.0.48-6.20.C30mdk.x86_64.rpm
34b8969d6cdf063c24c3db5da60b66ed corporate/3.0/x86_64/apache2-mod_mem_cache-2.0.48-6.20.C30mdk.x86_64.rpm
b4ff66b59400e60406286db040351c46 corporate/3.0/x86_64/apache2-mod_proxy-2.0.48-6.20.C30mdk.x86_64.rpm
e0fce8ab4362f1a40461af7cc1f388c0 corporate/3.0/x86_64/apache2-mod_ssl-2.0.48-6.20.C30mdk.x86_64.rpm
6da81ad00ba8f7e6f35e18a81b79ecc4 corporate/3.0/x86_64/apache2-modules-2.0.48-6.20.C30mdk.x86_64.rpm
3cef182192afb5a101aed6b824d9950a corporate/3.0/x86_64/apache2-source-2.0.48-6.20.C30mdk.x86_64.rpm
7b3b62b6b01d77c344a66b74f6fc92c0 corporate/3.0/x86_64/lib64apr0-2.0.48-6.20.C30mdk.x86_64.rpm
f048b454b9bf609c1cc7b13c413387d4 corporate/3.0/SRPMS/apache2-2.0.48-6.20.C30mdk.src.rpm
Multi Network Firewall 2.0:
dc646d83c4a17cd5253cad5627b27baf mnf/2.0/i586/apache2-2.0.48-6.20.C30mdk.i586.rpm
b3e5796e1c8b600153bb7760aa3c7c44 mnf/2.0/i586/apache2-common-2.0.48-6.20.C30mdk.i586.rpm
0c1b528680931b0d0d62aed029c00cc2 mnf/2.0/i586/apache2-devel-2.0.48-6.20.C30mdk.i586.rpm
3951d007d5ba03eec47465eaabfe3f23 mnf/2.0/i586/apache2-manual-2.0.48-6.20.C30mdk.i586.rpm
8e55c40e40744a064882cd0fa4ef5cf0 mnf/2.0/i586/apache2-mod_cache-2.0.48-6.20.C30mdk.i586.rpm
3f91a25523c535522cc84ff120fdc0ed mnf/2.0/i586/apache2-mod_dav-2.0.48-6.20.C30mdk.i586.rpm
f2b9e2ce65a8b9195befd7ac0250e6c4 mnf/2.0/i586/apache2-mod_deflate-2.0.48-6.20.C30mdk.i586.rpm
6c612ca239c1e15ca44beea45802d2ca mnf/2.0/i586/apache2-mod_disk_cache-2.0.48-6.20.C30mdk.i586.rpm
1fe18f3beae65e236fc2ebb124fac665 mnf/2.0/i586/apache2-mod_file_cache-2.0.48-6.20.C30mdk.i586.rpm
239baa6e2e43f7e4d8b68ba57d604f2c mnf/2.0/i586/apache2-mod_ldap-2.0.48-6.20.C30mdk.i586.rpm
0b90721f4df783807ad1a10608f6bab1 mnf/2.0/i586/apache2-mod_mem_cache-2.0.48-6.20.C30mdk.i586.rpm
7f372005bb7420f976f2841f86c97397 mnf/2.0/i586/apache2-mod_proxy-2.0.48-6.20.C30mdk.i586.rpm
41edbf29d8d04a4eb449b3c7970ac106 mnf/2.0/i586/apache2-mod_ssl-2.0.48-6.20.C30mdk.i586.rpm
0173e0d347b2f8371cb2ebd8224e9953 mnf/2.0/i586/apache2-modules-2.0.48-6.20.C30mdk.i586.rpm
2ce003b3977c10d3e88b2d6c1dad3f9b mnf/2.0/i586/apache2-source-2.0.48-6.20.C30mdk.i586.rpm
f4e5264b902bfb715cb473971f15919b mnf/2.0/i586/libapr0-2.0.48-6.20.C30mdk.i586.rpm
8378e9f5191f581f69e6035c384a18d9 mnf/2.0/SRPMS/apache2-2.0.48-6.20.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKKs7EmqjQ0CJFipgRAvW1AKDFncWXD3WDxWdnZ15jHvdjXjvsjwCfYM/c
qWtinAYlUKkAjD1lrgm+KdM=
=o+c7
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists