---------------------------------------------------------------------
Fedora Legacy Test Update Notification
FEDORALEGACY-2006-175406
Bugzilla https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175406
2006-02-08
---------------------------------------------------------------------

Name        : httpd
Versions    : rh73: apache-1.3.27-9.legacy
Versions    : rh9: httpd-2.0.40-21.21.legacy
Versions    : fc1: httpd-2.0.51-1.10.legacy
Versions    : fc2: httpd-2.0.51-2.9.5.legacy
Versions    : fc3: httpd-2.0.53-3.4.legacy
Summary     : The httpd Web server
Description :
This package contains a powerful, full-featured, efficient, and
freely-available Web server based on work done by the Apache Software
Foundation. It is also the most popular Web server on the Internet.

---------------------------------------------------------------------
Update Information:

Updated Apache httpd packages that correct three security issues are now
available.

The Apache HTTP Server is a popular and freely-available Web server.

A memory leak in the worker MPM could allow remote attackers to cause a
denial of service (memory consumption) via aborted connections, which
prevents the memory for the transaction pool from being reused for other
connections. The Common Vulnerabilities and Exposures project assigned
the name CVE-2005-2970 to this issue. This vulnerability only affects
users who are using the non-default worker MPM.

A flaw in mod_imap when using the Referer directive with image maps was
discovered. With certain site configurations, a remote attacker could
perform a cross-site scripting attack if a victim can be forced to visit
a malicious URL using certain web browsers. (CVE-2005-3352)

A NULL pointer dereference flaw in mod_ssl was discovered affecting
server configurations where an SSL virtual host is configured with
access control and a custom 400 error document. A remote attacker could
send a carefully crafted request to trigger this issue which would lead
to a crash. This crash would only be a denial of service if using the
non-default worker MPM. (CVE-2005-3357)

Users of httpd should update to these erratum packages which contain
backported patches to correct these issues.

---------------------------------------------------------------------
Changelogs

rh73:
* Sun Jan 22 2006 Marc Deslauriers <[EMAIL PROTECTED]>
1.3.27-9.legacy
- mod_imap: add security fix for XSS issue (CVE-2005-3352)

rh9:
* Sun Jan 22 2006 Marc Deslauriers <[EMAIL PROTECTED]>
2.0.40-21.21.legacy
- mod_ssl: add security fix for HTTP-on-SSL-port handling (CVE-2005-3357)
- mod_imap: add security fix for XSS issue (CVE-2005-3352)
- worker MPM: add security fix for memory consumption DoS (CVE-2005-2970),
  and bug fixes for handling resource allocation failures (#171759)

fc1:
* Sun Jan 22 2006 Marc Deslauriers <[EMAIL PROTECTED]>
2.0.51-1.10.legacy
- mod_ssl: add security fix for HTTP-on-SSL-port handling (CVE-2005-3357)
- mod_imap: add security fix for XSS issue (CVE-2005-3352)
- worker MPM: add security fix for memory consumption DoS (CVE-2005-2970),
  and bug fixes for handling resource allocation failures (#171759)

fc2:
* Sun Jan 22 2006 Marc Deslauriers <[EMAIL PROTECTED]>
2.0.51-2.9.5.legacy
- mod_ssl: add security fix for HTTP-on-SSL-port handling (CVE-2005-3357)
- mod_imap: add security fix for XSS issue (CVE-2005-3352)
- worker MPM: add security fix for memory consumption DoS (CVE-2005-2970),
  and bug fixes for handling resource allocation failures (#171759)

fc3:
* Sun Jan 22 2006 Marc Deslauriers <[EMAIL PROTECTED]>
2.0.53-3.4.legacy
- mod_ssl: add security fix for HTTP-on-SSL-port handling (CVE-2005-3357)
- mod_imap: add security fix for XSS issue (CVE-2005-3352)
- worker MPM: add security fix for memory consumption DoS (CVE-2005-2970),
  and bug fixes for handling resource allocation failures (#171759)

---------------------------------------------------------------------
This update can be downloaded from:
  http://download.fedoralegacy.org/
(sha1sums)

rh73:
c55d929dd5acbf4b0191a28b0ad128f1064810f8
redhat/7.3/updates-testing/i386/apache-1.3.27-9.legacy.i386.rpm
aae52f7966d03dd6e81f8b8b5a090bf60fa8e601
redhat/7.3/updates-testing/i386/apache-devel-1.3.27-9.legacy.i386.rpm
fafcea3e68311223b5a814a482927cd645c4356a
redhat/7.3/updates-testing/i386/apache-manual-1.3.27-9.legacy.i386.rpm
db23f5e77a78f78a346104038a564f0197ee9414
redhat/7.3/updates-testing/SRPMS/apache-1.3.27-9.legacy.src.rpm

rh9:
8e6ca52b5fb88a43322a38966ffeb0285b0699e1
redhat/9/updates-testing/i386/httpd-2.0.40-21.21.legacy.i386.rpm
be601feefd0483b24e3ce5efdfadcef6b5d7d040
redhat/9/updates-testing/i386/httpd-devel-2.0.40-21.21.legacy.i386.rpm
8816478ae2287a3d2d4c9ca91d55662efcae2b87
redhat/9/updates-testing/i386/httpd-manual-2.0.40-21.21.legacy.i386.rpm
2d565db0d6fa0756c51ca7aef8211b463c5f5348
redhat/9/updates-testing/i386/mod_ssl-2.0.40-21.21.legacy.i386.rpm
e05115a5178fbf853dfe8fdc75b962c44a787316
redhat/9/updates-testing/SRPMS/httpd-2.0.40-21.21.legacy.src.rpm

fc1:
d34d8993fa09ebc2c017c98ac459688a913593f6
fedora/1/updates-testing/i386/httpd-2.0.51-1.10.legacy.i386.rpm
1598bdf136a0ab14195df7d9f4425ab6442ab3f7
fedora/1/updates-testing/i386/httpd-devel-2.0.51-1.10.legacy.i386.rpm
e5d6b42924b9fd81869cbe07f410abd2ecaa106e
fedora/1/updates-testing/i386/httpd-manual-2.0.51-1.10.legacy.i386.rpm
56c59eec43c7d87f9f59f7068f80e2774de1784a
fedora/1/updates-testing/i386/mod_ssl-2.0.51-1.10.legacy.i386.rpm
4294e34c392cc90465d35dbfda88f95aae87c291
fedora/1/updates-testing/SRPMS/httpd-2.0.51-1.10.legacy.src.rpm

fc2:
3572be6a040d0efe5e71186578b42bb991328254
fedora/2/updates-testing/i386/httpd-2.0.51-2.9.5.legacy.i386.rpm
3d75ef3d7720894c886c4d1a1e52f97f2b4bb345
fedora/2/updates-testing/i386/httpd-devel-2.0.51-2.9.5.legacy.i386.rpm
74c6d5286da4daf697f041d3084cab0a2fda46c6
fedora/2/updates-testing/i386/httpd-manual-2.0.51-2.9.5.legacy.i386.rpm
72050bf7341db26b0d72b8565102bb55eb9be250
fedora/2/updates-testing/i386/mod_ssl-2.0.51-2.9.5.legacy.i386.rpm
32a2bfe031fcbb40ed1db4a84bacc5ad78a7b7a4
fedora/2/updates-testing/SRPMS/httpd-2.0.51-2.9.5.legacy.src.rpm

fc3:
563dd27fb0e74e13d1b8960e189f05af60926333
fedora/3/updates-testing/i386/httpd-2.0.53-3.4.legacy.i386.rpm
3673bec7d02bd1972c20cbca6d77bccf4c08f516
fedora/3/updates-testing/i386/httpd-devel-2.0.53-3.4.legacy.i386.rpm
d004815e520338f6565e0f18d21847c6439c841f
fedora/3/updates-testing/i386/httpd-manual-2.0.53-3.4.legacy.i386.rpm
48eac837da227883d681aa23e182ebb00174980f
fedora/3/updates-testing/i386/httpd-suexec-2.0.53-3.4.legacy.i386.rpm
ffdb283132cdf0e0de7026709087781a4f2eabb0
fedora/3/updates-testing/i386/mod_ssl-2.0.53-3.4.legacy.i386.rpm
b6698d717f8dd6b028ee32184bcc778724695a83
fedora/3/updates-testing/SRPMS/httpd-2.0.53-3.4.legacy.src.rpm

---------------------------------------------------------------------

Please test and comment in bugzilla.

Attachment: signature.asc
Description: OpenPGP digital signature

--
fedora-legacy-list mailing list
fedora-legacy-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-legacy-list

Reply via email to