From security@mandriva.com Mon Aug 29 19:41:19 2005 From: Mandriva Security Team To: full-disclosure@lists.grok.org.uk Date: Mon, 29 Aug 2005 17:35:22 -0600 Subject: [Full-disclosure] MDKSA-2005:155 - Updated apache2 packages fix integer overflow vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Update Advisory _______________________________________________________________________ Package name: apache2 Advisory ID: MDKSA-2005:155 Date: August 29th, 2005 Affected versions: 10.0, Corporate 3.0, Multi Network Firewall 2.0 ______________________________________________________________________ Problem Description: Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow. The apache2 packages, as shipped, were built using a private copy of pcre. The updated packages have been rebuilt against the system pcre libs to correct this problem. 10.1 and 10.2/LE2005 are already built against the system pcre. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491 ______________________________________________________________________ Updated Packages: Mandrakelinux 10.0: 943881ebaf9da5f51f8bccfbc515f641 10.0/RPMS/apache2-2.0.48-6.10.100mdk.i586.rpm 292468acb04a3760d3c075450f44348f 10.0/RPMS/apache2-common-2.0.48-6.10.100mdk.i586.rpm f8f5ebd3f2cb2bef58d5ff57e0ab2404 10.0/RPMS/apache2-devel-2.0.48-6.10.100mdk.i586.rpm b25bc3e1a57d0beea4723fa5219456f3 10.0/RPMS/apache2-manual-2.0.48-6.10.100mdk.i586.rpm 84177f9b193cc5e0468b409350abfbd9 10.0/RPMS/apache2-mod_cache-2.0.48-6.10.100mdk.i586.rpm c31198b85803695ac28f3922aeb9f511 10.0/RPMS/apache2-mod_dav-2.0.48-6.10.100mdk.i586.rpm c4091a8481f73214dffb467c36bc89d8 10.0/RPMS/apache2-mod_deflate-2.0.48-6.10.100mdk.i586.rpm 819ffb5454d55a4965eea4757baa5e3d 10.0/RPMS/apache2-mod_disk_cache-2.0.48-6.10.100mdk.i586.rpm 498eed09c7a7fa948f90325e6b112d70 10.0/RPMS/apache2-mod_file_cache-2.0.48-6.10.100mdk.i586.rpm 2ac7af479cf53207a5453122dd359a06 10.0/RPMS/apache2-mod_ldap-2.0.48-6.10.100mdk.i586.rpm 6ed3ae29e63e28ec20937fcc9f900b32 10.0/RPMS/apache2-mod_mem_cache-2.0.48-6.10.100mdk.i586.rpm c2ecd41c3008aaab2a5fc7c3b8110e8d 10.0/RPMS/apache2-mod_proxy-2.0.48-6.10.100mdk.i586.rpm bcf9a227556770e2a4eabcd1d6a0fa75 10.0/RPMS/apache2-mod_ssl-2.0.48-6.10.100mdk.i586.rpm 7d75dd812c46a815af24cae789298784 10.0/RPMS/apache2-modules-2.0.48-6.10.100mdk.i586.rpm d590f67cfd17c4b59d056d8d3a3f21ec 10.0/RPMS/apache2-source-2.0.48-6.10.100mdk.i586.rpm 723c8e5b221a63d28b91691200a549a2 10.0/RPMS/libapr0-2.0.48-6.10.100mdk.i586.rpm 427b5be76093a411ed79a1b26418b4f1 10.0/SRPMS/apache2-2.0.48-6.10.100mdk.src.rpm Mandrakelinux 10.0/AMD64: 48c6f8b3783dce36696d75c5fe063892 amd64/10.0/RPMS/apache2-2.0.48-6.10.100mdk.amd64.rpm 24a5d0d2312d241a445d6dc0873894f4 amd64/10.0/RPMS/apache2-common-2.0.48-6.10.100mdk.amd64.rpm b4f316e8e38729d80a1cb544f6fda84d amd64/10.0/RPMS/apache2-devel-2.0.48-6.10.100mdk.amd64.rpm ff7075e8a5027ae1fcf6a4a9d00d32a7 amd64/10.0/RPMS/apache2-manual-2.0.48-6.10.100mdk.amd64.rpm 1835dababf1adbf47fbaa856967d13ee amd64/10.0/RPMS/apache2-mod_cache-2.0.48-6.10.100mdk.amd64.rpm f8c3af9e481b7990911e523a266b43cb amd64/10.0/RPMS/apache2-mod_dav-2.0.48-6.10.100mdk.amd64.rpm 56adf6d95827036fd9b4978ba998d19c amd64/10.0/RPMS/apache2-mod_deflate-2.0.48-6.10.100mdk.amd64.rpm 1d0c37546852ddb316ed1087ad436f45 amd64/10.0/RPMS/apache2-mod_disk_cache-2.0.48-6.10.100mdk.amd64.rpm 5484d540fe7f7a161ed0c32a9ed61127 amd64/10.0/RPMS/apache2-mod_file_cache-2.0.48-6.10.100mdk.amd64.rpm 1013ef5cdfed64f359494f01b0bbecb9 amd64/10.0/RPMS/apache2-mod_ldap-2.0.48-6.10.100mdk.amd64.rpm 74188fb21ef2d83c28fcbfbfca142e0a amd64/10.0/RPMS/apache2-mod_mem_cache-2.0.48-6.10.100mdk.amd64.rpm 32fcde1183be227e9580b653d5866538 amd64/10.0/RPMS/apache2-mod_proxy-2.0.48-6.10.100mdk.amd64.rpm 4869bd9b9add97bba229abd258dba421 amd64/10.0/RPMS/apache2-mod_ssl-2.0.48-6.10.100mdk.amd64.rpm 930c24a0258d3c4d11f1abea2544ce9d amd64/10.0/RPMS/apache2-modules-2.0.48-6.10.100mdk.amd64.rpm 45e8ee1b64fc88658332406cdd0eaf83 amd64/10.0/RPMS/apache2-source-2.0.48-6.10.100mdk.amd64.rpm fb46e03fa056d9b63498aa66b7f254cb amd64/10.0/RPMS/lib64apr0-2.0.48-6.10.100mdk.amd64.rpm 427b5be76093a411ed79a1b26418b4f1 amd64/10.0/SRPMS/apache2-2.0.48-6.10.100mdk.src.rpm Multi Network Firewall 2.0: ea96befbb54a665d1cf0c11dcf1514bf mnf/2.0/RPMS/apache2-2.0.48-6.10.M20mdk.i586.rpm afeca22641361fb5631e49f444de8ff1 mnf/2.0/RPMS/apache2-common-2.0.48-6.10.M20mdk.i586.rpm 6a50b170156421073348fb2338328f57 mnf/2.0/RPMS/apache2-mod_cache-2.0.48-6.10.M20mdk.i586.rpm d1c01d727d5b052bfa7954f51721e330 mnf/2.0/RPMS/apache2-mod_proxy-2.0.48-6.10.M20mdk.i586.rpm 1579d72fed28c50c975ffa3a379d9e7e mnf/2.0/RPMS/apache2-mod_ssl-2.0.48-6.10.M20mdk.i586.rpm e8497128965023773b924dd5184c117e mnf/2.0/RPMS/apache2-modules-2.0.48-6.10.M20mdk.i586.rpm f76df0da42e2e53066dcc7e2c155efa6 mnf/2.0/RPMS/libapr0-2.0.48-6.10.M20mdk.i586.rpm cd715c544eef0a8fcc5679e5d99bf367 mnf/2.0/SRPMS/apache2-2.0.48-6.10.M20mdk.src.rpm Corporate 3.0: 948e7fd54b52dd426feeef80851a92a3 corporate/3.0/RPMS/apache2-2.0.48-6.10.C30mdk.i586.rpm 00035b7b4a06cd0b0eab2c9f7c77ad08 corporate/3.0/RPMS/apache2-common-2.0.48-6.10.C30mdk.i586.rpm 697959b3821dfb4269364fbfeab1fca6 corporate/3.0/RPMS/apache2-manual-2.0.48-6.10.C30mdk.i586.rpm 5117e0e63770b39125ba5d1daed9a73b corporate/3.0/RPMS/apache2-mod_cache-2.0.48-6.10.C30mdk.i586.rpm e94b4e2d3a554c70917442aef200a492 corporate/3.0/RPMS/apache2-mod_dav-2.0.48-6.10.C30mdk.i586.rpm 88ac11a73700157d43c8997333e905a2 corporate/3.0/RPMS/apache2-mod_disk_cache-2.0.48-6.10.C30mdk.i586.rpm 4192805bccf577c7358ae6635af5e534 corporate/3.0/RPMS/apache2-mod_ldap-2.0.48-6.10.C30mdk.i586.rpm bb4cf932da2eb9602e715faa934767a9 corporate/3.0/RPMS/apache2-mod_proxy-2.0.48-6.10.C30mdk.i586.rpm 0079565a79878ba35b704e4276860e5a corporate/3.0/RPMS/apache2-mod_ssl-2.0.48-6.10.C30mdk.i586.rpm 6b9c6a04b228369dff41e18636318202 corporate/3.0/RPMS/apache2-modules-2.0.48-6.10.C30mdk.i586.rpm 1ce5739d3bb178e57b7e2d0cfe13eb7b corporate/3.0/RPMS/libapr0-2.0.48-6.10.C30mdk.i586.rpm eaca583e9f7ac8ac977055f72ef0ec8d corporate/3.0/SRPMS/apache2-2.0.48-6.10.C30mdk.src.rpm Corporate 3.0/X86_64: abdd3378c0c6637864bf17d99940a2e1 x86_64/corporate/3.0/RPMS/apache2-2.0.48-6.10.C30mdk.x86_64.rpm 7b0da940e23e91b4a2a88bdd9c49b023 x86_64/corporate/3.0/RPMS/apache2-common-2.0.48-6.10.C30mdk.x86_64.rpm ba3ec5e6b91f34dd663454f47a063fbc x86_64/corporate/3.0/RPMS/apache2-manual-2.0.48-6.10.C30mdk.x86_64.rpm 74718f83dcae78613638098ea9228f4b x86_64/corporate/3.0/RPMS/apache2-mod_cache-2.0.48-6.10.C30mdk.x86_64.rpm 3457b4a346899d2e83aaa6b16175bdc4 x86_64/corporate/3.0/RPMS/apache2-mod_dav-2.0.48-6.10.C30mdk.x86_64.rpm f5f35188da9a02797dff8363b1b111f5 x86_64/corporate/3.0/RPMS/apache2-mod_disk_cache-2.0.48-6.10.C30mdk.x86_64.rpm 7d0e9ce91f83cd14410634b7896d945c x86_64/corporate/3.0/RPMS/apache2-mod_ldap-2.0.48-6.10.C30mdk.x86_64.rpm 75e816d1d0d9b34f47067732ca70fd76 x86_64/corporate/3.0/RPMS/apache2-mod_proxy-2.0.48-6.10.C30mdk.x86_64.rpm 428a10d1da9e7450350987d069ab52b8 x86_64/corporate/3.0/RPMS/apache2-mod_ssl-2.0.48-6.10.C30mdk.x86_64.rpm 7da21cde4fd9e8aebde63cfb1dc58439 x86_64/corporate/3.0/RPMS/apache2-modules-2.0.48-6.10.C30mdk.x86_64.rpm 2e0f026f8d6714f68f0c46670142a1e3 x86_64/corporate/3.0/RPMS/lib64apr0-2.0.48-6.10.C30mdk.x86_64.rpm eaca583e9f7ac8ac977055f72ef0ec8d x86_64/corporate/3.0/SRPMS/apache2-2.0.48-6.10.C30mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFDE5u5mqjQ0CJFipgRAlmrAKDU1vSR5kkH2lvkIG8sZQI9ke86hgCeKfiG FmVlkbTXGPG1HfDEtSGSYcs= =ECBd -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/