lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030721231932.25380.qmail@updates.mandrakesoft.com>
From: security at linux-mandrake.com (Mandrake Linux Security Team)
Subject: MDKSA-2003:075 - Updated apache2 packages fix multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           apache2
Advisory ID:            MDKSA-2003:075
Date:                   July 21st, 2003

Affected versions:	9.1
________________________________________________________________________

Problem Description:

 Several vulnerabilities were discovered in Apache 2.x versions prior to
 2.0.47.  From the Apache 2.0.47 release notes:
 
 Certain sequences of per-directory renegotiations and the
 SSLCipherSuite directive being used to upgrade from a weak ciphersuite
 to a strong one could result in the weak ciphersuite being used in
 place of the new one (CAN-2003-0192).
 
 Certain errors returned by accept() on rarely accessed ports could
 cause temporary Denial of Service due to a bug in the prefork MPM
 (CAN-2003-0253).
 
 Denial of Service was caused when target host is IPv6 but FTP proxy
 server can't create IPv6 socket (CAN-2003-0254).
 
 The server would crash when going into an infinite loop due to too many
 subsequent internal redirects and nested subrequests (VU#379828).
 
 The Apache Software Foundation thanks Saheed Akhtar and Yoshioka Tsuneo
 for responsibly reporting these issues.
 
 To upgrade these apache packages, first stop Apache by issuing, as
 root:
 
   service httpd stop
 
 After the upgrade, restart Apache with:
 
   service httpd start
________________________________________________________________________

References:
  
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0192
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254
  http://www.kb.cert.org/vuls/id/379828
  http://marc.theaimsgroup.com/?l=bugtraq&m=105259038503175
________________________________________________________________________

Updated Packages:
  
 Mandrake Linux 9.1:
 6878287e750c587d3240e23f809ee9f4  9.1/RPMS/apache-conf-2.0.44-11.1mdk.i586.rpm
 847ee399abf4caea566db066d725c215  9.1/RPMS/apache2-2.0.47-1.1mdk.i586.rpm
 b96ec2e4ae78347e54bcdee5174268ea  9.1/RPMS/apache2-common-2.0.47-1.1mdk.i586.rpm
 693fa8f4b57865352c052e6ed056f8d2  9.1/RPMS/apache2-devel-2.0.47-1.1mdk.i586.rpm
 b52cc16627ecc10e75cf0064b23cdd79  9.1/RPMS/apache2-manual-2.0.47-1.1mdk.i586.rpm
 5e53cb7985228e1387363b98235fbf27  9.1/RPMS/apache2-mod_dav-2.0.47-1.1mdk.i586.rpm
 7bb48f701eb345b2dfbc7a2b4f5a58a1  9.1/RPMS/apache2-mod_ldap-2.0.47-1.1mdk.i586.rpm
 e0b5a5df69eff6d11c1ee3d153bf4522  9.1/RPMS/apache2-mod_ssl-2.0.47-1.1mdk.i586.rpm
 0d7aad34a3609bed609d0144eafe8c67  9.1/RPMS/apache2-modules-2.0.47-1.1mdk.i586.rpm
 a6fe923d55c30533a257194b90175898  9.1/RPMS/apache2-source-2.0.47-1.1mdk.i586.rpm
 58f60b14beda6d52843fd59c7b4ae45b  9.1/RPMS/libapr0-2.0.47-1.1mdk.i586.rpm
 6ca5928088016125c0493ba42e42d8bd  9.1/SRPMS/apache-conf-2.0.44-11.1mdk.src.rpm
 a649bb491709936ab8c69944d8daae9f  9.1/SRPMS/apache2-2.0.47-1.1mdk.src.rpm

 Mandrake Linux 9.1/PPC:
 6f1c1f3393a2517d2a6efc060986d5f6  ppc/9.1/RPMS/apache-conf-2.0.44-11.1mdk.ppc.rpm
 7692cc8ceb9570d00bdcd14a31635ea8  ppc/9.1/RPMS/apache2-2.0.47-1.1mdk.ppc.rpm
 4d0a1f922b53da1cad75c0ffe92b6eb6  ppc/9.1/RPMS/apache2-common-2.0.47-1.1mdk.ppc.rpm
 6428efa29c215a11d16af2eb19c66df0  ppc/9.1/RPMS/apache2-devel-2.0.47-1.1mdk.ppc.rpm
 4e09ede360c766be3480f26f06e898da  ppc/9.1/RPMS/apache2-manual-2.0.47-1.1mdk.ppc.rpm
 d8a9778144123ed670e69efae82704df  ppc/9.1/RPMS/apache2-mod_dav-2.0.47-1.1mdk.ppc.rpm
 1d11cb6e70fb41ab59fe97291c883825  ppc/9.1/RPMS/apache2-mod_ldap-2.0.47-1.1mdk.ppc.rpm
 c555df0597fbaf7a7600c86b77470830  ppc/9.1/RPMS/apache2-mod_ssl-2.0.47-1.1mdk.ppc.rpm
 870f375144db36fa7f97b4e4a220b76f  ppc/9.1/RPMS/apache2-modules-2.0.47-1.1mdk.ppc.rpm
 36afbb4e44d0525a97f36a22eddc3fea  ppc/9.1/RPMS/apache2-source-2.0.47-1.1mdk.ppc.rpm
 190aa752b6b00ac28d5c246d35d9cdef  ppc/9.1/RPMS/libapr0-2.0.47-1.1mdk.ppc.rpm
 6ca5928088016125c0493ba42e42d8bd  ppc/9.1/SRPMS/apache-conf-2.0.44-11.1mdk.src.rpm
 a649bb491709936ab8c69944d8daae9f  ppc/9.1/SRPMS/apache2-2.0.47-1.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate or urpmi.  The verification
of md5 checksums and GPG signatures is performed automatically for you.

A list of FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team by executing:

  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

  http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/HHUDmqjQ0CJFipgRAmb/AKDDasRYVcndQuj3uMZ66ygxNB/4KQCeJuyB
9s5JS4qAJYa7TYKGQ0ybSoU=
=Abo/
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ