openSUSE-SU-2014:0072-1: moderate: update for lighttpd
openSUSE Security Update: update for lighttpd ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:0072-1 Rating: moderate References: #849059 #850468 #850469 Cross-References: CVE-2013-4508 CVE-2013-4559 CVE-2013-4560 Affected Products: openSUSE 13.1 openSUSE 12.3 openSUSE 12.2 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: - added cve-2013-4508.patch and cve-2013-4508-regression-bug729480.patch: (bnc#849059) When defining an ssl.cipher-list, it works for the 'default' HTTPS setup ($SERVER["socket"] 443 block), but when you utilize SNI ($HTTP["host"] blocks within the $SERVER["socket"] block) the ssl.cipher-list seems to not inherit into the host blocks and instead will default to include all of the available openssl ciphers (except SSL v2/v3 based if those are disabled) - added cve-2013-4559.patch (bnc#850468) check success of setuid,setgid,setgroups - added cve-2013-4560.patch (bnc#850469) FAM: fix use after free - added cve-2013-4508.patch and cve-2013-4508-regression-bug729480.patch: (bnc#849059) When defining an ssl.cipher-list, it works for the 'default' HTTPS setup ($SERVER["socket"] 443 block), but when you utilize SNI ($HTTP["host"] blocks within the $SERVER["socket"] block) the ssl.cipher-list seems to not inherit into the host blocks and instead will default to include all of the available openssl ciphers (except SSL v2/v3 based if those are disabled) - added cve-2013-4559.patch (bnc#850468) check success of setuid,setgid,setgroups - added cve-2013-4560.patch (bnc#850469) FAM: fix use after free - added cve-2013-4508.patch and cve-2013-4508-regression-bug729480.patch: (bnc#849059) When defining an ssl.cipher-list, it works for the 'default' HTTPS setup ($SERVER["socket"] 443 block), but when you utilize SNI ($HTTP["host"] blocks within the $SERVER["socket"] block) the ssl.cipher-list seems to not inherit into the host blocks and instead will default to include all of the available openssl ciphers (except SSL v2/v3 based if those are disabled) - added cve-2013-4559.patch (bnc#850468) check success of setuid,setgid,setgroups - added cve-2013-4560.patch (bnc#850469) FAM: fix use after free Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2014-43 - openSUSE 12.3: zypper in -t patch openSUSE-2014-43 - openSUSE 12.2: zypper in -t patch openSUSE-2014-43 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i586 x86_64): lighttpd-1.4.32-2.5.1 lighttpd-debuginfo-1.4.32-2.5.1 lighttpd-debugsource-1.4.32-2.5.1 lighttpd-mod_cml-1.4.32-2.5.1 lighttpd-mod_cml-debuginfo-1.4.32-2.5.1 lighttpd-mod_geoip-1.4.32-2.5.1 lighttpd-mod_geoip-debuginfo-1.4.32-2.5.1 lighttpd-mod_magnet-1.4.32-2.5.1 lighttpd-mod_magnet-debuginfo-1.4.32-2.5.1 lighttpd-mod_mysql_vhost-1.4.32-2.5.1 lighttpd-mod_mysql_vhost-debuginfo-1.4.32-2.5.1 lighttpd-mod_rrdtool-1.4.32-2.5.1 lighttpd-mod_rrdtool-debuginfo-1.4.32-2.5.1 lighttpd-mod_trigger_b4_dl-1.4.32-2.5.1 lighttpd-mod_trigger_b4_dl-debuginfo-1.4.32-2.5.1 lighttpd-mod_webdav-1.4.32-2.5.1 lighttpd-mod_webdav-debuginfo-1.4.32-2.5.1 - openSUSE 12.3 (i586 x86_64): lighttpd-1.4.31-6.5.1 lighttpd-debuginfo-1.4.31-6.5.1 lighttpd-debugsource-1.4.31-6.5.1 lighttpd-mod_cml-1.4.31-6.5.1 lighttpd-mod_cml-debuginfo-1.4.31-6.5.1 lighttpd-mod_geoip-1.4.31-6.5.1 lighttpd-mod_geoip-debuginfo-1.4.31-6.5.1 lighttpd-mod_magnet-1.4.31-6.5.1 lighttpd-mod_magnet-debuginfo-1.4.31-6.5.1 lighttpd-mod_mysql_vhost-1.4.31-6.5.1 lighttpd-mod_mysql_vhost-debuginfo-1.4.31-6.5.1 lighttpd-mod_rrdtool-1.4.31-6.5.1 lighttpd-mod_rrdtool-debuginfo-1.4.31-6.5.1 lighttpd-mod_trigger_b4_dl-1.4.31-6.5.1 lighttpd-mod_trigger_b4_dl-debuginfo-1.4.31-6.5.1 lighttpd-mod_webdav-1.4.31-6.5.1 lighttpd-mod_webdav-debuginfo-1.4.31-6.5.1 - openSUSE 12.2 (i586 x86_64): lighttpd-1.4.31-4.13.1 lighttpd-debuginfo-1.4.31-4.13.1 lighttpd-debugsource-1.4.31-4.13.1 lighttpd-mod_cml-1.4.31-4.13.1 lighttpd-mod_cml-debuginfo-1.4.31-4.13.1 lighttpd-mod_geoip-1.4.31-4.13.1 lighttpd-mod_geoip-debuginfo-1.4.31-4.13.1 lighttpd-mod_magnet-1.4.31-4.13.1 lighttpd-mod_magnet-debuginfo-1.4.31-4.13.1 lighttpd-mod_mysql_vhost-1.4.31-4.13.1 lighttpd-mod_mysql_vhost-debuginfo-1.4.31-4.13.1 lighttpd-mod_rrdtool-1.4.31-4.13.1 lighttpd-mod_rrdtool-debuginfo-1.4.31-4.13.1 lighttpd-mod_trigger_b4_dl-1.4.31-4.13.1 lighttpd-mod_trigger_b4_dl-debuginfo-1.4.31-4.13.1 lighttpd-mod_webdav-1.4.31-4.13.1 lighttpd-mod_webdav-debuginfo-1.4.31-4.13.1 References: http://support.novell.com/security/cve/CVE-2013-4508.html http://support.novell.com/security/cve/CVE-2013-4559.html http://support.novell.com/security/cve/CVE-2013-4560.html https://bugzilla.novell.com/849059 https://bugzilla.novell.com/850468 https://bugzilla.novell.com/850469
participants (1)
-
opensuse-security@opensuse.org