lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue Aug 30 00:35:30 2005
From: security at mandriva.com (Mandriva Security Team)
Subject: MDKSA-2005:155 - Updated apache2 packages fix
	integer overflow vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandriva Linux Security Update Advisory
 _______________________________________________________________________

 Package name:           apache2
 Advisory ID:            MDKSA-2005:155
 Date:                   August 29th, 2005

 Affected versions:	 10.0, Corporate 3.0,
			 Multi Network Firewall 2.0
 ______________________________________________________________________

 Problem Description:

 Integer overflow in pcre_compile.c in Perl Compatible Regular
 Expressions (PCRE) before 6.2, as used in multiple products, allows
 attackers to execute arbitrary code via quantifier values in regular
 expressions, which leads to a heap-based buffer overflow.
 
 The apache2 packages, as shipped, were built using a private copy of pcre.
 
 The updated packages have been rebuilt against the system pcre libs
 to correct this problem. 10.1 and 10.2/LE2005 are already built against 
 the system pcre.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 943881ebaf9da5f51f8bccfbc515f641  10.0/RPMS/apache2-2.0.48-6.10.100mdk.i586.rpm
 292468acb04a3760d3c075450f44348f  10.0/RPMS/apache2-common-2.0.48-6.10.100mdk.i586.rpm
 f8f5ebd3f2cb2bef58d5ff57e0ab2404  10.0/RPMS/apache2-devel-2.0.48-6.10.100mdk.i586.rpm
 b25bc3e1a57d0beea4723fa5219456f3  10.0/RPMS/apache2-manual-2.0.48-6.10.100mdk.i586.rpm
 84177f9b193cc5e0468b409350abfbd9  10.0/RPMS/apache2-mod_cache-2.0.48-6.10.100mdk.i586.rpm
 c31198b85803695ac28f3922aeb9f511  10.0/RPMS/apache2-mod_dav-2.0.48-6.10.100mdk.i586.rpm
 c4091a8481f73214dffb467c36bc89d8  10.0/RPMS/apache2-mod_deflate-2.0.48-6.10.100mdk.i586.rpm
 819ffb5454d55a4965eea4757baa5e3d  10.0/RPMS/apache2-mod_disk_cache-2.0.48-6.10.100mdk.i586.rpm
 498eed09c7a7fa948f90325e6b112d70  10.0/RPMS/apache2-mod_file_cache-2.0.48-6.10.100mdk.i586.rpm
 2ac7af479cf53207a5453122dd359a06  10.0/RPMS/apache2-mod_ldap-2.0.48-6.10.100mdk.i586.rpm
 6ed3ae29e63e28ec20937fcc9f900b32  10.0/RPMS/apache2-mod_mem_cache-2.0.48-6.10.100mdk.i586.rpm
 c2ecd41c3008aaab2a5fc7c3b8110e8d  10.0/RPMS/apache2-mod_proxy-2.0.48-6.10.100mdk.i586.rpm
 bcf9a227556770e2a4eabcd1d6a0fa75  10.0/RPMS/apache2-mod_ssl-2.0.48-6.10.100mdk.i586.rpm
 7d75dd812c46a815af24cae789298784  10.0/RPMS/apache2-modules-2.0.48-6.10.100mdk.i586.rpm
 d590f67cfd17c4b59d056d8d3a3f21ec  10.0/RPMS/apache2-source-2.0.48-6.10.100mdk.i586.rpm
 723c8e5b221a63d28b91691200a549a2  10.0/RPMS/libapr0-2.0.48-6.10.100mdk.i586.rpm
 427b5be76093a411ed79a1b26418b4f1  10.0/SRPMS/apache2-2.0.48-6.10.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 48c6f8b3783dce36696d75c5fe063892  amd64/10.0/RPMS/apache2-2.0.48-6.10.100mdk.amd64.rpm
 24a5d0d2312d241a445d6dc0873894f4  amd64/10.0/RPMS/apache2-common-2.0.48-6.10.100mdk.amd64.rpm
 b4f316e8e38729d80a1cb544f6fda84d  amd64/10.0/RPMS/apache2-devel-2.0.48-6.10.100mdk.amd64.rpm
 ff7075e8a5027ae1fcf6a4a9d00d32a7  amd64/10.0/RPMS/apache2-manual-2.0.48-6.10.100mdk.amd64.rpm
 1835dababf1adbf47fbaa856967d13ee  amd64/10.0/RPMS/apache2-mod_cache-2.0.48-6.10.100mdk.amd64.rpm
 f8c3af9e481b7990911e523a266b43cb  amd64/10.0/RPMS/apache2-mod_dav-2.0.48-6.10.100mdk.amd64.rpm
 56adf6d95827036fd9b4978ba998d19c  amd64/10.0/RPMS/apache2-mod_deflate-2.0.48-6.10.100mdk.amd64.rpm
 1d0c37546852ddb316ed1087ad436f45  amd64/10.0/RPMS/apache2-mod_disk_cache-2.0.48-6.10.100mdk.amd64.rpm
 5484d540fe7f7a161ed0c32a9ed61127  amd64/10.0/RPMS/apache2-mod_file_cache-2.0.48-6.10.100mdk.amd64.rpm
 1013ef5cdfed64f359494f01b0bbecb9  amd64/10.0/RPMS/apache2-mod_ldap-2.0.48-6.10.100mdk.amd64.rpm
 74188fb21ef2d83c28fcbfbfca142e0a  amd64/10.0/RPMS/apache2-mod_mem_cache-2.0.48-6.10.100mdk.amd64.rpm
 32fcde1183be227e9580b653d5866538  amd64/10.0/RPMS/apache2-mod_proxy-2.0.48-6.10.100mdk.amd64.rpm
 4869bd9b9add97bba229abd258dba421  amd64/10.0/RPMS/apache2-mod_ssl-2.0.48-6.10.100mdk.amd64.rpm
 930c24a0258d3c4d11f1abea2544ce9d  amd64/10.0/RPMS/apache2-modules-2.0.48-6.10.100mdk.amd64.rpm
 45e8ee1b64fc88658332406cdd0eaf83  amd64/10.0/RPMS/apache2-source-2.0.48-6.10.100mdk.amd64.rpm
 fb46e03fa056d9b63498aa66b7f254cb  amd64/10.0/RPMS/lib64apr0-2.0.48-6.10.100mdk.amd64.rpm
 427b5be76093a411ed79a1b26418b4f1  amd64/10.0/SRPMS/apache2-2.0.48-6.10.100mdk.src.rpm

 Multi Network Firewall 2.0:
 ea96befbb54a665d1cf0c11dcf1514bf  mnf/2.0/RPMS/apache2-2.0.48-6.10.M20mdk.i586.rpm
 afeca22641361fb5631e49f444de8ff1  mnf/2.0/RPMS/apache2-common-2.0.48-6.10.M20mdk.i586.rpm
 6a50b170156421073348fb2338328f57  mnf/2.0/RPMS/apache2-mod_cache-2.0.48-6.10.M20mdk.i586.rpm
 d1c01d727d5b052bfa7954f51721e330  mnf/2.0/RPMS/apache2-mod_proxy-2.0.48-6.10.M20mdk.i586.rpm
 1579d72fed28c50c975ffa3a379d9e7e  mnf/2.0/RPMS/apache2-mod_ssl-2.0.48-6.10.M20mdk.i586.rpm
 e8497128965023773b924dd5184c117e  mnf/2.0/RPMS/apache2-modules-2.0.48-6.10.M20mdk.i586.rpm
 f76df0da42e2e53066dcc7e2c155efa6  mnf/2.0/RPMS/libapr0-2.0.48-6.10.M20mdk.i586.rpm
 cd715c544eef0a8fcc5679e5d99bf367  mnf/2.0/SRPMS/apache2-2.0.48-6.10.M20mdk.src.rpm

 Corporate 3.0:
 948e7fd54b52dd426feeef80851a92a3  corporate/3.0/RPMS/apache2-2.0.48-6.10.C30mdk.i586.rpm
 00035b7b4a06cd0b0eab2c9f7c77ad08  corporate/3.0/RPMS/apache2-common-2.0.48-6.10.C30mdk.i586.rpm
 697959b3821dfb4269364fbfeab1fca6  corporate/3.0/RPMS/apache2-manual-2.0.48-6.10.C30mdk.i586.rpm
 5117e0e63770b39125ba5d1daed9a73b  corporate/3.0/RPMS/apache2-mod_cache-2.0.48-6.10.C30mdk.i586.rpm
 e94b4e2d3a554c70917442aef200a492  corporate/3.0/RPMS/apache2-mod_dav-2.0.48-6.10.C30mdk.i586.rpm
 88ac11a73700157d43c8997333e905a2  corporate/3.0/RPMS/apache2-mod_disk_cache-2.0.48-6.10.C30mdk.i586.rpm
 4192805bccf577c7358ae6635af5e534  corporate/3.0/RPMS/apache2-mod_ldap-2.0.48-6.10.C30mdk.i586.rpm
 bb4cf932da2eb9602e715faa934767a9  corporate/3.0/RPMS/apache2-mod_proxy-2.0.48-6.10.C30mdk.i586.rpm
 0079565a79878ba35b704e4276860e5a  corporate/3.0/RPMS/apache2-mod_ssl-2.0.48-6.10.C30mdk.i586.rpm
 6b9c6a04b228369dff41e18636318202  corporate/3.0/RPMS/apache2-modules-2.0.48-6.10.C30mdk.i586.rpm
 1ce5739d3bb178e57b7e2d0cfe13eb7b  corporate/3.0/RPMS/libapr0-2.0.48-6.10.C30mdk.i586.rpm
 eaca583e9f7ac8ac977055f72ef0ec8d  corporate/3.0/SRPMS/apache2-2.0.48-6.10.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 abdd3378c0c6637864bf17d99940a2e1  x86_64/corporate/3.0/RPMS/apache2-2.0.48-6.10.C30mdk.x86_64.rpm
 7b0da940e23e91b4a2a88bdd9c49b023  x86_64/corporate/3.0/RPMS/apache2-common-2.0.48-6.10.C30mdk.x86_64.rpm
 ba3ec5e6b91f34dd663454f47a063fbc  x86_64/corporate/3.0/RPMS/apache2-manual-2.0.48-6.10.C30mdk.x86_64.rpm
 74718f83dcae78613638098ea9228f4b  x86_64/corporate/3.0/RPMS/apache2-mod_cache-2.0.48-6.10.C30mdk.x86_64.rpm
 3457b4a346899d2e83aaa6b16175bdc4  x86_64/corporate/3.0/RPMS/apache2-mod_dav-2.0.48-6.10.C30mdk.x86_64.rpm
 f5f35188da9a02797dff8363b1b111f5  x86_64/corporate/3.0/RPMS/apache2-mod_disk_cache-2.0.48-6.10.C30mdk.x86_64.rpm
 7d0e9ce91f83cd14410634b7896d945c  x86_64/corporate/3.0/RPMS/apache2-mod_ldap-2.0.48-6.10.C30mdk.x86_64.rpm
 75e816d1d0d9b34f47067732ca70fd76  x86_64/corporate/3.0/RPMS/apache2-mod_proxy-2.0.48-6.10.C30mdk.x86_64.rpm
 428a10d1da9e7450350987d069ab52b8  x86_64/corporate/3.0/RPMS/apache2-mod_ssl-2.0.48-6.10.C30mdk.x86_64.rpm
 7da21cde4fd9e8aebde63cfb1dc58439  x86_64/corporate/3.0/RPMS/apache2-modules-2.0.48-6.10.C30mdk.x86_64.rpm
 2e0f026f8d6714f68f0c46670142a1e3  x86_64/corporate/3.0/RPMS/lib64apr0-2.0.48-6.10.C30mdk.x86_64.rpm
 eaca583e9f7ac8ac977055f72ef0ec8d  x86_64/corporate/3.0/SRPMS/apache2-2.0.48-6.10.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDE5u5mqjQ0CJFipgRAlmrAKDU1vSR5kkH2lvkIG8sZQI9ke86hgCeKfiG
FmVlkbTXGPG1HfDEtSGSYcs=
=ECBd
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists