Mailinglist Archive: opensuse-security-announce (31 mails)

< Previous Next >
[security-announce] SUSE-SU-2011:1007-1: important: Security update for Apache
SUSE Security Update: Security update for Apache
______________________________________________________________________________

Announcement ID: SUSE-SU-2011:1007-1
Rating: important
References: #690734 #713966
Cross-References: CVE-2011-3192
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:


This update fixes a remote denial of service bug (memory
exhaustion) in the Apache 2 HTTP server, that could be
triggered by remote attackers using multiple overlapping
Request Ranges. (CVE-2011-3192)

It also fixes a bug, where the LimitRequestFieldsize config
option into account when parsing headers from backend,
thereby avoiding that the receiving buffers are too small.

Security Issue reference:

* CVE-2011-3192
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192
>

Indications:

Please install this update.


Package List:

- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):

apache2-2.2.3-16.36.1
apache2-devel-2.2.3-16.36.1
apache2-doc-2.2.3-16.36.1
apache2-example-pages-2.2.3-16.36.1
apache2-prefork-2.2.3-16.36.1
apache2-worker-2.2.3-16.36.1

- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):

apache2-2.2.3-16.36.1
apache2-devel-2.2.3-16.36.1
apache2-doc-2.2.3-16.36.1
apache2-example-pages-2.2.3-16.36.1
apache2-prefork-2.2.3-16.36.1
apache2-worker-2.2.3-16.36.1


References:

http://support.novell.com/security/cve/CVE-2011-3192.html
https://bugzilla.novell.com/690734
https://bugzilla.novell.com/713966

http://download.novell.com/patch/finder/?keywords=c3940d73bd140b3d6d6e2d878f94f4f3

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages