openSUSE Security Update: lighttpd to 1.4.35
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2014:0496-1
Rating:             important
References:         #867350 
Cross-References:   CVE-2014-2323 CVE-2014-2324
Affected Products:
                    openSUSE 11.4
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   lighttpd was updated to version 1.4.35, fixing bugs and
   security issues:

   CVE-2014-2323: SQL injection vulnerability in
   mod_mysql_vhost.c in lighttpd allowed remote attackers to
   execute arbitrary SQL commands via the host name, related
   to request_check_hostname.

   CVE-2014-2323: Multiple directory traversal vulnerabilities
   in (1) mod_evhost and (2) mod_simple_vhost in lighttpd
   allowed remote attackers to read arbitrary files via a ..
   (dot dot) in the host name, related to
   request_check_hostname.

   More information can be found on the lighttpd advisory
   page:
      014_01.txt

   Other changes:
   * [network/ssl] fix build error if TLSEXT is disabled
   * [mod_fastcgi] fix use after free (only triggered if
   fastcgi debug is active)
   * [mod_rrdtool] fix invalid read (string not null
   terminated)
   * [mod_dirlisting] fix memory leak if pcre fails
   * [mod_fastcgi,mod_scgi] fix resource leaks on spawning
   backends
   * [mod_magnet] fix memory leak
   * add comments for switch fall throughs
   * remove logical dead code
   * [buffer] fix length check in buffer_is_equal_right_len
   * fix resource leaks in error cases on config parsing and
   other initializations
   * add force_assert() to enforce assertions as simple
   assert()s are disabled by -DNDEBUG (fixes #2546)
   * [mod_cml_lua] fix null pointer dereference
   * force assertion: setting FD_CLOEXEC must work (if
   available)
   * [network] check return value of lseek()
   * fix unchecked return values from
   stream_open/stat_cache_get_entry
   * [mod_webdav] fix logic error in handling file creation
   error
   * check length of unix domain socket filenames
   * fix SQL injection / host name validation (thx Jann
   Horn)for all the changes see
   /usr/share/doc/packages/lighttpd/NEWS


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 11.4:

      zypper in -t patch 2014-44

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 11.4 (i586 x86_64):

      lighttpd-1.4.35-41.1
      lighttpd-debuginfo-1.4.35-41.1
      lighttpd-debugsource-1.4.35-41.1
      lighttpd-mod_cml-1.4.35-41.1
      lighttpd-mod_cml-debuginfo-1.4.35-41.1
      lighttpd-mod_geoip-1.4.35-41.1
      lighttpd-mod_geoip-debuginfo-1.4.35-41.1
      lighttpd-mod_magnet-1.4.35-41.1
      lighttpd-mod_magnet-debuginfo-1.4.35-41.1
      lighttpd-mod_mysql_vhost-1.4.35-41.1
      lighttpd-mod_mysql_vhost-debuginfo-1.4.35-41.1
      lighttpd-mod_rrdtool-1.4.35-41.1
      lighttpd-mod_rrdtool-debuginfo-1.4.35-41.1
      lighttpd-mod_trigger_b4_dl-1.4.35-41.1
      lighttpd-mod_trigger_b4_dl-debuginfo-1.4.35-41.1
      lighttpd-mod_webdav-1.4.35-41.1
      lighttpd-mod_webdav-debuginfo-1.4.35-41.1


References:

   https://www.suse.com/security/cve/CVE-2014-2323.html
   https://www.suse.com/security/cve/CVE-2014-2324.html
   https://bugzilla.novell.com/867350

openSUSE: 2014:0496-1: important: lighttpd

April 8, 2014
An update that fixes two vulnerabilities is now available

Description

lighttpd was updated to version 1.4.35, fixing bugs and security issues: CVE-2014-2323: SQL injection vulnerability in mod_mysql_vhost.c in lighttpd allowed remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname. CVE-2014-2323: Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd allowed remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname. More information can be found on the lighttpd advisory page: 014_01.txt Other changes: * [network/ssl] fix build error if TLSEXT is disabled * [mod_fastcgi] fix use after free (only triggered if fastcgi debug is active) * [mod_rrdtool] fix invalid read (string not null terminated) * [mod_dirlisting] fix memory leak if pcre fails * [mod_fastcgi,mod_scgi] fix resource leaks on spawning backends * [mod_magnet] fix memory leak * add comments for switch fall throughs * remove logical dead code * [buffer] fix length check in buffer_is_equal_right_len * fix resource leaks in error cases on config parsing and other initializations * add force_assert() to enforce assertions as simple assert()s are disabled by -DNDEBUG (fixes #2546) * [mod_cml_lua] fix null pointer dereference * force assertion: setting FD_CLOEXEC must work (if available) * [network] check return value of lseek() * fix unchecked return values from stream_open/stat_cache_get_entry * [mod_webdav] fix logic error in handling file creation error * check length of unix domain socket filenames * fix SQL injection / host name validation (thx Jann Horn)for all the changes see /usr/share/doc/packages/lighttpd/NEWS

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch 2014-44 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 11.4 (i586 x86_64): lighttpd-1.4.35-41.1 lighttpd-debuginfo-1.4.35-41.1 lighttpd-debugsource-1.4.35-41.1 lighttpd-mod_cml-1.4.35-41.1 lighttpd-mod_cml-debuginfo-1.4.35-41.1 lighttpd-mod_geoip-1.4.35-41.1 lighttpd-mod_geoip-debuginfo-1.4.35-41.1 lighttpd-mod_magnet-1.4.35-41.1 lighttpd-mod_magnet-debuginfo-1.4.35-41.1 lighttpd-mod_mysql_vhost-1.4.35-41.1 lighttpd-mod_mysql_vhost-debuginfo-1.4.35-41.1 lighttpd-mod_rrdtool-1.4.35-41.1 lighttpd-mod_rrdtool-debuginfo-1.4.35-41.1 lighttpd-mod_trigger_b4_dl-1.4.35-41.1 lighttpd-mod_trigger_b4_dl-debuginfo-1.4.35-41.1 lighttpd-mod_webdav-1.4.35-41.1 lighttpd-mod_webdav-debuginfo-1.4.35-41.1


References

https://www.suse.com/security/cve/CVE-2014-2323.html https://www.suse.com/security/cve/CVE-2014-2324.html https://bugzilla.novell.com/867350


Severity
Announcement ID: openSUSE-SU-2014:0496-1
Rating: important
Affected Products: openSUSE 11.4 .

Related News