httpd-2.2.3-76.0.1.AXS3

エラータID: AXSA:2013-45:01

Release date: 
Friday, January 25, 2013 - 14:17
Subject: 
httpd-2.2.3-76.0.1.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

The Apache HTTP Server is a powerful, efficient, and extensible web server.

Security issues fixed with this release:

• CVE-2008-0455
Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.

• CVE-2008-0456
CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.

• CVE-2012-2687
Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.

Fixed bugs:

• Previously, the validity of /etc/pki/tls/private/localhost.key was not checked before running the "%post" script for the "mod_ssl" package: If /etc/pki/tls/certs/localhost.crt did not exist and "localhost.key" was present but invalid and upgrading httpd with mod_ssl failed. This has been fixed.

• Added a patch to disable non-FIPS functionality in the "mod_ssl" module when running in FIPS mode so that httpd starts as expected under FIPS mode.

• Previously, the httpd exit codes were not LSB compliant. This has been fixed and httpd now returns "1" as an exist status code.

• Fixed the handling of long chunk-lines (32 bytes or more).

• Fixed header merging for 304 case.

• Fixed the response-line strings handling when run in a proxy set up so that response-lines without a "description" string are properly returned to the client.

• Previously, a bug in the mod_mem_cache module could result in a cached entity becoming corrupt when aborting an HTTP connection. This has been fixed.

Enhancements:

• Added support for the "LDAPReferrals" configuration directive.

• The "mod_proxy_ajp" module now supports the "ProxyErrorOverride" directive

• Now, if the /etc/sysconfig/httpd-disable-posttrans file exists, the "%posttrans" scriptlet will not automatically restarts the httpd service after a package upgrade.

• The output of "httpd -S" now includes configured alias names for each virtual host.

• "mod_ssl" using the "_DN_userID" (like "SSL_CLIENT_S_DN_userID") now expose new certificate variable names.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. httpd-2.2.3-76.0.1.AXS3.src.rpm
    MD5: aaa5f72a51033e30b4c178cbdf8a122d
    SHA-256: f48464f2819472ab4af23bdae802475a522403e85d7d7d697a27edae927014b0
    Size: 6.28 MB

Asianux Server 3 for x86
  1. httpd-2.2.3-76.0.1.AXS3.i386.rpm
    MD5: 7be4d08c9193d146409e58ceaaca1a2c
    SHA-256: a046e8a47250ca1139e3261cd60d03bcb9fd7d27bc7575e8fbd4bc632bc58c70
    Size: 1.13 MB
  2. httpd-devel-2.2.3-76.0.1.AXS3.i386.rpm
    MD5: 83b66320f6ae9cecc55ba43f8792a5d4
    SHA-256: db6c3844bd5e9ae554ca3860868547656f1774aa70d1e96ff395befa2e35d7c6
    Size: 156.29 kB
  3. httpd-manual-2.2.3-76.0.1.AXS3.i386.rpm
    MD5: 280539e58503183a160c0782638a65c0
    SHA-256: 96384d5d14a999c1671f78a2b9d06daee0b557502a6103c8236f8dd5470618c6
    Size: 827.62 kB
  4. mod_ssl-2.2.3-76.0.1.AXS3.i386.rpm
    MD5: 2ece7ce6a858bdbeb7713e5055a7729b
    SHA-256: 2ce4c3932e6685574b3b50b262ad6a7855319d04bd98aff8dd50ba466064f099
    Size: 96.77 kB

Asianux Server 3 for x86_64
  1. httpd-2.2.3-76.0.1.AXS3.x86_64.rpm
    MD5: 2dc5222ad8ad1d4335efedea93fe90ea
    SHA-256: 781229abcf6a8db76d282b8baaff355a6ee4a21164bb8bc5ff1e580c1e2fa898
    Size: 1.14 MB
  2. httpd-devel-2.2.3-76.0.1.AXS3.x86_64.rpm
    MD5: 8187d0938f8062f6316ce5fca77aeb7c
    SHA-256: 385a91fbbdcc3d3d37ad774ecf2bf52bcb775c41fc8f8bdad05af8297e51e9d8
    Size: 156.29 kB
  3. httpd-manual-2.2.3-76.0.1.AXS3.x86_64.rpm
    MD5: 1889f9392df2dcf6299f6e83969b4256
    SHA-256: 51479f20732326a9f5a8fb86691352c6210949989f2df05fcc11a39e256b63c3
    Size: 827.66 kB
  4. mod_ssl-2.2.3-76.0.1.AXS3.x86_64.rpm
    MD5: cc03c4ca5623e15a71fd2e1850321f16
    SHA-256: 731530f6e4b71eb04a25b0b6020e6ed0dd5782401080bebef476332f07553c51
    Size: 97.58 kB