Date:         Wed, 23 Jul 2014 13:43:11 +0000
Reply-To:     scientific-linux-users@listserv.fnal.gov
Sender:       Security Errata for Scientific Linux
              
From:         Pat Riehecky 
Subject:      Security ERRATA Important: httpd on SL5.x, SL6.x i386/x86_64
MIME-Version: 1.0

Synopsis:          Important: httpd security update
Advisory ID:       SLSA-2014:0920-1
Issue Date:        2014-07-23
CVE Numbers:       CVE-2014-0231
                   CVE-2014-0118
                   CVE-2014-0226
--

A race condition flaw, leading to heap-based buffer overflows, was found
in the mod_status httpd module. A remote attacker able to access a status
page served by mod_status on a server using a threaded Multi-Processing
Module (MPM) could send a specially crafted request that would cause the
httpd child process to crash or, possibly, allow the attacker to execute
arbitrary code with the privileges of the "apache" user. (CVE-2014-0226)

A denial of service flaw was found in the way httpd's mod_deflate module
handled request body decompression (configured via the "DEFLATE" input
filter). A remote attacker able to send a request whose body would be
decompressed could use this flaw to consume an excessive amount of system
memory and CPU on the target system. (CVE-2014-0118)

A denial of service flaw was found in the way httpd's mod_cgid module
executed CGI scripts that did not read data from the standard input. A
remote attacker could submit a specially crafted request that would cause
the httpd child process to hang indefinitely. (CVE-2014-0231)

After installing the updated packages, the httpd daemon will be restarted
automatically.
--

SL5
  x86_64
    httpd-2.2.3-87.sl5.x86_64.rpm
    httpd-debuginfo-2.2.3-87.sl5.x86_64.rpm
    mod_ssl-2.2.3-87.sl5.x86_64.rpm
    httpd-debuginfo-2.2.3-87.sl5.i386.rpm
    httpd-devel-2.2.3-87.sl5.i386.rpm
    httpd-devel-2.2.3-87.sl5.x86_64.rpm
    httpd-manual-2.2.3-87.sl5.x86_64.rpm
  i386
    httpd-2.2.3-87.sl5.i386.rpm
    httpd-debuginfo-2.2.3-87.sl5.i386.rpm
    mod_ssl-2.2.3-87.sl5.i386.rpm
    httpd-devel-2.2.3-87.sl5.i386.rpm
    httpd-manual-2.2.3-87.sl5.i386.rpm
SL6
  x86_64
    httpd-2.2.15-31.sl6.x86_64.rpm
    httpd-debuginfo-2.2.15-31.sl6.x86_64.rpm
    httpd-tools-2.2.15-31.sl6.x86_64.rpm
    httpd-debuginfo-2.2.15-31.sl6.i686.rpm
    httpd-devel-2.2.15-31.sl6.i686.rpm
    httpd-devel-2.2.15-31.sl6.x86_64.rpm
    mod_ssl-2.2.15-31.sl6.x86_64.rpm
  i386
    httpd-2.2.15-31.sl6.i686.rpm
    httpd-debuginfo-2.2.15-31.sl6.i686.rpm
    httpd-tools-2.2.15-31.sl6.i686.rpm
    httpd-devel-2.2.15-31.sl6.i686.rpm
    mod_ssl-2.2.15-31.sl6.i686.rpm
  noarch
    httpd-manual-2.2.15-31.sl6.noarch.rpm

- Scientific Linux Development Team

SciLinux: CVE-2014-0231 Important: httpd SL5.x, SL6.x i386/x86_64

Important: httpd security update

Summary

Important: httpd security update



Security Fixes

Severity
Advisory ID: SLSA-2014:0920-1
Issued Date: : 2014-07-23
CVE Numbers: CVE-2014-0231
CVE-2014-0118
CVE-2014-0226

Related News