You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by bu...@apache.org on 2015/01/30 14:09:54 UTC

svn commit: r938378 - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_24.html

Author: buildbot
Date: Fri Jan 30 13:09:53 2015
New Revision: 938378

Log:
Staging update by buildbot for httpd

Modified:
    websites/staging/httpd/trunk/content/   (props changed)
    websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
    websites/staging/httpd/trunk/content/security/vulnerabilities_24.html

Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Fri Jan 30 13:09:53 2015
@@ -1 +1 @@
-1655713
+1656006

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Fri Jan 30 13:09:53 2015
@@ -1,6 +1,26 @@
-<security updated="20141112">
+<security updated="20150130">
 
-<issue fixed="2.4.11-dev" reported="20140917" public="20141112">
+<issue fixed="2.4.12" reported="20141109" public="20141109" released="20150130">
+<cve name="CVE-2014-8109"/>
+<severity level="4">low</severity>
+<title>mod_lua multiple "Require" directive handling is broken</title>
+<description><p>
+Fix handling of the Require line in mod_lau when a LuaAuthzProvider is
+used in multiple Require directives with different arguments.  This could
+lead to different authentication rules than expected.
+</p></description>
+<affects prod="httpd" version="2.4.10"/>
+<affects prod="httpd" version="2.4.9"/>
+<affects prod="httpd" version="2.4.8"/>
+<affects prod="httpd" version="2.4.7"/>
+<affects prod="httpd" version="2.4.6"/>
+<affects prod="httpd" version="2.4.4"/>
+<affects prod="httpd" version="2.4.3"/>
+<affects prod="httpd" version="2.4.2"/>
+<affects prod="httpd" version="2.4.1"/>
+</issue>
+
+<issue fixed="2.4.12" reported="20140917" public="20141112" released="20150130">
 <cve name="CVE-2014-3583"/>
 <severity level="4">low</severity>
 <title>mod_proxy_fcgi out-of-bounds memory read</title>
@@ -16,7 +36,7 @@ This issue was reported by Teguh P. Alko
 <affects prod="httpd" version="2.4.10"/>
 </issue>
 
-<issue fixed="2.4.11-dev" reported="20140908" public="20140908">
+<issue fixed="2.4.12" reported="20140908" public="20140908" released="20150130">
 <cve name="CVE-2014-3581"/>
 <severity level="4">low</severity>
 <title>mod_cache crash with empty Content-Type header</title>
@@ -36,7 +56,7 @@ This crash would only be a denial of ser
 <affects prod="httpd" version="2.4.1"/>
 </issue>
 
-<issue fixed="2.4.11-dev" reported="20130906" public="20131019">
+<issue fixed="2.4.12" reported="20130906" public="20131019" released="20150130">
 <cve name="CVE-2013-5704"/>
 <severity level="4">low</severity>
 <title>HTTP Trailers processing bypass</title>

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Fri Jan 30 13:09:53 2015
@@ -83,8 +83,27 @@ in a "-dev" release then this means that
 the development source tree and will be part of an upcoming full release.</p><p> This page is created from a database of vulnerabilities originally
 populated by Apache Week.  Please send comments or corrections for
 these vulnerabilities to the <a href="/security_report.html">Security
-Team</a>.  </p><p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases.  Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><h1 id="2.4.11-dev">
-Fixed in Apache httpd 2.4.11-dev</h1><dl>
+Team</a>.  </p><p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases.  Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><h1 id="2.4.12">
+Fixed in Apache httpd 2.4.12</h1><dl>
+  <dd>
+    <b>low: </b>
+    <b>
+      <name name="CVE-2014-8109">mod_lua multiple "Require" directive handling is broken</name>
+    </b>
+    <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109">CVE-2014-8109</a>
+    <p>
+Fix handling of the Require line in mod_lau when a LuaAuthzProvider is
+used in multiple Require directives with different arguments.  This could
+lead to different authentication rules than expected.
+</p>
+  </dd>
+  <dd>
+  Issue public: 9th November 2014<br/></dd>
+  <dd>
+  Update Released: 30th January 2015<br/></dd>
+  <dd>
+      Affects: 
+    2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>
   <dd>
     <b>low: </b>
     <b>
@@ -106,7 +125,8 @@ This issue was reported by Teguh P. Alko
   <dd>
   Reported to security team: 17th September 2014<br/>
   Issue public: 12th November 2014<br/></dd>
-  <dd/>
+  <dd>
+  Update Released: 30th January 2015<br/></dd>
   <dd>
       Affects: 
     2.4.10<p/></dd>
@@ -124,7 +144,8 @@ This crash would only be a denial of ser
   </dd>
   <dd>
   Issue public: 8th September 2014<br/></dd>
-  <dd/>
+  <dd>
+  Update Released: 30th January 2015<br/></dd>
   <dd>
       Affects: 
     2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>
@@ -149,7 +170,8 @@ This issue was reported by Martin Holst
   <dd>
   Reported to security team: 6th September 2013<br/>
   Issue public: 19th October 2013<br/></dd>
-  <dd/>
+  <dd>
+  Update Released: 30th January 2015<br/></dd>
   <dd>
       Affects: 
     2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>