You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by bu...@apache.org on 2015/01/30 14:09:54 UTC
svn commit: r938378 - in /websites/staging/httpd/trunk/content: ./
security/vulnerabilities-httpd.xml security/vulnerabilities_24.html
Author: buildbot
Date: Fri Jan 30 13:09:53 2015
New Revision: 938378
Log:
Staging update by buildbot for httpd
Modified:
websites/staging/httpd/trunk/content/ (props changed)
websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Fri Jan 30 13:09:53 2015
@@ -1 +1 @@
-1655713
+1656006
Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Fri Jan 30 13:09:53 2015
@@ -1,6 +1,26 @@
-<security updated="20141112">
+<security updated="20150130">
-<issue fixed="2.4.11-dev" reported="20140917" public="20141112">
+<issue fixed="2.4.12" reported="20141109" public="20141109" released="20150130">
+<cve name="CVE-2014-8109"/>
+<severity level="4">low</severity>
+<title>mod_lua multiple "Require" directive handling is broken</title>
+<description><p>
+Fix handling of the Require line in mod_lau when a LuaAuthzProvider is
+used in multiple Require directives with different arguments. This could
+lead to different authentication rules than expected.
+</p></description>
+<affects prod="httpd" version="2.4.10"/>
+<affects prod="httpd" version="2.4.9"/>
+<affects prod="httpd" version="2.4.8"/>
+<affects prod="httpd" version="2.4.7"/>
+<affects prod="httpd" version="2.4.6"/>
+<affects prod="httpd" version="2.4.4"/>
+<affects prod="httpd" version="2.4.3"/>
+<affects prod="httpd" version="2.4.2"/>
+<affects prod="httpd" version="2.4.1"/>
+</issue>
+
+<issue fixed="2.4.12" reported="20140917" public="20141112" released="20150130">
<cve name="CVE-2014-3583"/>
<severity level="4">low</severity>
<title>mod_proxy_fcgi out-of-bounds memory read</title>
@@ -16,7 +36,7 @@ This issue was reported by Teguh P. Alko
<affects prod="httpd" version="2.4.10"/>
</issue>
-<issue fixed="2.4.11-dev" reported="20140908" public="20140908">
+<issue fixed="2.4.12" reported="20140908" public="20140908" released="20150130">
<cve name="CVE-2014-3581"/>
<severity level="4">low</severity>
<title>mod_cache crash with empty Content-Type header</title>
@@ -36,7 +56,7 @@ This crash would only be a denial of ser
<affects prod="httpd" version="2.4.1"/>
</issue>
-<issue fixed="2.4.11-dev" reported="20130906" public="20131019">
+<issue fixed="2.4.12" reported="20130906" public="20131019" released="20150130">
<cve name="CVE-2013-5704"/>
<severity level="4">low</severity>
<title>HTTP Trailers processing bypass</title>
Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Fri Jan 30 13:09:53 2015
@@ -83,8 +83,27 @@ in a "-dev" release then this means that
the development source tree and will be part of an upcoming full release.</p><p> This page is created from a database of vulnerabilities originally
populated by Apache Week. Please send comments or corrections for
these vulnerabilities to the <a href="/security_report.html">Security
-Team</a>. </p><p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases. Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><h1 id="2.4.11-dev">
-Fixed in Apache httpd 2.4.11-dev</h1><dl>
+Team</a>. </p><p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases. Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><h1 id="2.4.12">
+Fixed in Apache httpd 2.4.12</h1><dl>
+ <dd>
+ <b>low: </b>
+ <b>
+ <name name="CVE-2014-8109">mod_lua multiple "Require" directive handling is broken</name>
+ </b>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109">CVE-2014-8109</a>
+ <p>
+Fix handling of the Require line in mod_lau when a LuaAuthzProvider is
+used in multiple Require directives with different arguments. This could
+lead to different authentication rules than expected.
+</p>
+ </dd>
+ <dd>
+ Issue public: 9th November 2014<br/></dd>
+ <dd>
+ Update Released: 30th January 2015<br/></dd>
+ <dd>
+ Affects:
+ 2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>
<dd>
<b>low: </b>
<b>
@@ -106,7 +125,8 @@ This issue was reported by Teguh P. Alko
<dd>
Reported to security team: 17th September 2014<br/>
Issue public: 12th November 2014<br/></dd>
- <dd/>
+ <dd>
+ Update Released: 30th January 2015<br/></dd>
<dd>
Affects:
2.4.10<p/></dd>
@@ -124,7 +144,8 @@ This crash would only be a denial of ser
</dd>
<dd>
Issue public: 8th September 2014<br/></dd>
- <dd/>
+ <dd>
+ Update Released: 30th January 2015<br/></dd>
<dd>
Affects:
2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>
@@ -149,7 +170,8 @@ This issue was reported by Martin Holst
<dd>
Reported to security team: 6th September 2013<br/>
Issue public: 19th October 2013<br/></dd>
- <dd/>
+ <dd>
+ Update Released: 30th January 2015<br/></dd>
<dd>
Affects:
2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>