Mailinglist Archive: opensuse-updates (108 mails)

< Previous Next >
openSUSE-SU-2014:0072-1: moderate: update for lighttpd
openSUSE Security Update: update for lighttpd
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0072-1
Rating: moderate
References: #849059 #850468 #850469
Cross-References: CVE-2013-4508 CVE-2013-4559 CVE-2013-4560

Affected Products:
openSUSE 13.1
openSUSE 12.3
openSUSE 12.2
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:


- added cve-2013-4508.patch and
cve-2013-4508-regression-bug729480.patch: (bnc#849059)
When defining an ssl.cipher-list, it works for the
'default' HTTPS setup ($SERVER["socket"] 443 block), but
when you utilize SNI ($HTTP["host"] blocks within the
$SERVER["socket"] block) the ssl.cipher-list seems to not
inherit into the host blocks and instead will default to
include all of the available openssl ciphers (except SSL
v2/v3 based if those are disabled)
- added cve-2013-4559.patch (bnc#850468) check success of
setuid,setgid,setgroups
- added cve-2013-4560.patch (bnc#850469) FAM: fix use after
free

- added cve-2013-4508.patch and
cve-2013-4508-regression-bug729480.patch: (bnc#849059)
When defining an ssl.cipher-list, it works for the
'default' HTTPS setup ($SERVER["socket"] 443 block), but
when you utilize SNI ($HTTP["host"] blocks within the
$SERVER["socket"] block) the ssl.cipher-list seems to not
inherit into the host blocks and instead will default to
include all of the available openssl ciphers (except SSL
v2/v3 based if those are disabled)
- added cve-2013-4559.patch (bnc#850468) check success of
setuid,setgid,setgroups
- added cve-2013-4560.patch (bnc#850469) FAM: fix use after
free

- added cve-2013-4508.patch and
cve-2013-4508-regression-bug729480.patch: (bnc#849059)
When defining an ssl.cipher-list, it works for the
'default' HTTPS setup ($SERVER["socket"] 443 block), but
when you utilize SNI ($HTTP["host"] blocks within the
$SERVER["socket"] block) the ssl.cipher-list seems to not
inherit into the host blocks and instead will default to
include all of the available openssl ciphers (except SSL
v2/v3 based if those are disabled)
- added cve-2013-4559.patch (bnc#850468) check success of
setuid,setgid,setgroups
- added cve-2013-4560.patch (bnc#850469) FAM: fix use after
free


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch openSUSE-2014-43

- openSUSE 12.3:

zypper in -t patch openSUSE-2014-43

- openSUSE 12.2:

zypper in -t patch openSUSE-2014-43

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i586 x86_64):

lighttpd-1.4.32-2.5.1
lighttpd-debuginfo-1.4.32-2.5.1
lighttpd-debugsource-1.4.32-2.5.1
lighttpd-mod_cml-1.4.32-2.5.1
lighttpd-mod_cml-debuginfo-1.4.32-2.5.1
lighttpd-mod_geoip-1.4.32-2.5.1
lighttpd-mod_geoip-debuginfo-1.4.32-2.5.1
lighttpd-mod_magnet-1.4.32-2.5.1
lighttpd-mod_magnet-debuginfo-1.4.32-2.5.1
lighttpd-mod_mysql_vhost-1.4.32-2.5.1
lighttpd-mod_mysql_vhost-debuginfo-1.4.32-2.5.1
lighttpd-mod_rrdtool-1.4.32-2.5.1
lighttpd-mod_rrdtool-debuginfo-1.4.32-2.5.1
lighttpd-mod_trigger_b4_dl-1.4.32-2.5.1
lighttpd-mod_trigger_b4_dl-debuginfo-1.4.32-2.5.1
lighttpd-mod_webdav-1.4.32-2.5.1
lighttpd-mod_webdav-debuginfo-1.4.32-2.5.1

- openSUSE 12.3 (i586 x86_64):

lighttpd-1.4.31-6.5.1
lighttpd-debuginfo-1.4.31-6.5.1
lighttpd-debugsource-1.4.31-6.5.1
lighttpd-mod_cml-1.4.31-6.5.1
lighttpd-mod_cml-debuginfo-1.4.31-6.5.1
lighttpd-mod_geoip-1.4.31-6.5.1
lighttpd-mod_geoip-debuginfo-1.4.31-6.5.1
lighttpd-mod_magnet-1.4.31-6.5.1
lighttpd-mod_magnet-debuginfo-1.4.31-6.5.1
lighttpd-mod_mysql_vhost-1.4.31-6.5.1
lighttpd-mod_mysql_vhost-debuginfo-1.4.31-6.5.1
lighttpd-mod_rrdtool-1.4.31-6.5.1
lighttpd-mod_rrdtool-debuginfo-1.4.31-6.5.1
lighttpd-mod_trigger_b4_dl-1.4.31-6.5.1
lighttpd-mod_trigger_b4_dl-debuginfo-1.4.31-6.5.1
lighttpd-mod_webdav-1.4.31-6.5.1
lighttpd-mod_webdav-debuginfo-1.4.31-6.5.1

- openSUSE 12.2 (i586 x86_64):

lighttpd-1.4.31-4.13.1
lighttpd-debuginfo-1.4.31-4.13.1
lighttpd-debugsource-1.4.31-4.13.1
lighttpd-mod_cml-1.4.31-4.13.1
lighttpd-mod_cml-debuginfo-1.4.31-4.13.1
lighttpd-mod_geoip-1.4.31-4.13.1
lighttpd-mod_geoip-debuginfo-1.4.31-4.13.1
lighttpd-mod_magnet-1.4.31-4.13.1
lighttpd-mod_magnet-debuginfo-1.4.31-4.13.1
lighttpd-mod_mysql_vhost-1.4.31-4.13.1
lighttpd-mod_mysql_vhost-debuginfo-1.4.31-4.13.1
lighttpd-mod_rrdtool-1.4.31-4.13.1
lighttpd-mod_rrdtool-debuginfo-1.4.31-4.13.1
lighttpd-mod_trigger_b4_dl-1.4.31-4.13.1
lighttpd-mod_trigger_b4_dl-debuginfo-1.4.31-4.13.1
lighttpd-mod_webdav-1.4.31-4.13.1
lighttpd-mod_webdav-debuginfo-1.4.31-4.13.1


References:

http://support.novell.com/security/cve/CVE-2013-4508.html
http://support.novell.com/security/cve/CVE-2013-4559.html
http://support.novell.com/security/cve/CVE-2013-4560.html
https://bugzilla.novell.com/849059
https://bugzilla.novell.com/850468
https://bugzilla.novell.com/850469


< Previous Next >
This Thread
  • No further messages