You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa lighttpd

Sigurnosni nedostaci programskog paketa lighttpd

——————————————————————————–
Fedora Update Notification
FEDORA-2014-3947
2014-03-15 13:27:06
——————————————————————————–

Name : lighttpd
Product : Fedora 19
Version : 1.4.35
Release : 1.fc19
URL : http://www.lighttpd.net/
Summary : Lightning fast webserver with light system requirements
Description :
Secure, fast, compliant and very flexible web-server which has been optimized
for high-performance environments. It has a very low memory footprint compared
to other webservers and takes care of cpu-load. Its advanced feature-set
(FastCGI, CGI, Auth, Output-Compression, URL-Rewriting and many more) make
it the perfect webserver-software for every server that is suffering load
problems.

——————————————————————————–
Update Information:

1.4.35, fixes SA-2014-01, CVE-2014-2323, CVE-2014-2324

[1] http://seclists.org/oss-sec/2014/q1/561
[2] http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
[3] http://www.lighttpd.net/2014/3/12/1.4.35/
——————————————————————————–
ChangeLog:

* Wed Mar 12 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.35-1
– 1.4.35, SA-2014-01.
* Fri Feb 21 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-4
– Enable lua, BZ 912546.
* Mon Feb 10 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-3
– Enable PIE, BZ 955145.
* Mon Feb 10 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-2
– Apply Ken Dreyer’s spec patches from BZ 850188.
* Wed Feb 5 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-1
– 1.4.34, multiple security fixes.
* Mon Aug 26 2013 Jon Ciesla <limburgher@gmail.com> – 1.4.32-1
– Update to 1.4.32, BZ 878915.
* Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 1.4.31-4
– Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1075711 – CVE-2014-2324 CVE-2014-2323 lighttpd: SQL injection and directory traversal vulnerabilities [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1075711
[ 2 ] Bug #1075710 – CVE-2014-2324 CVE-2014-2323 lighttpd: SQL injection and directory traversal vulnerabilities [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1075710
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update lighttpd’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-3887
2014-03-15 13:23:47
——————————————————————————–

Name : lighttpd
Product : Fedora 20
Version : 1.4.35
Release : 1.fc20
URL : http://www.lighttpd.net/
Summary : Lightning fast webserver with light system requirements
Description :
Secure, fast, compliant and very flexible web-server which has been optimized
for high-performance environments. It has a very low memory footprint compared
to other webservers and takes care of cpu-load. Its advanced feature-set
(FastCGI, CGI, Auth, Output-Compression, URL-Rewriting and many more) make
it the perfect webserver-software for every server that is suffering load
problems.

——————————————————————————–
Update Information:

1.4.35, fixes SA-2014-01, CVE-2014-2323, CVE-2014-2324

[1] http://seclists.org/oss-sec/2014/q1/561
[2] http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
[3] http://www.lighttpd.net/2014/3/12/1.4.35/
——————————————————————————–
ChangeLog:

* Wed Mar 12 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.35-1
– 1.4.35, SA-2014-01.
* Fri Feb 21 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-4
– Enable lua, BZ 912546.
* Mon Feb 10 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-3
– Enable PIE, BZ 955145.
* Mon Feb 10 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-2
– Apply Ken Dreyer’s spec patches from BZ 850188.
* Wed Feb 5 2014 Jon Ciesla <limburgher@gmail.com> – 1.4.34-1
– 1.4.34, multiple security fixes.
——————————————————————————–
References:

[ 1 ] Bug #1075711 – CVE-2014-2324 CVE-2014-2323 lighttpd: SQL injection and directory traversal vulnerabilities [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1075711
[ 2 ] Bug #1075710 – CVE-2014-2324 CVE-2014-2323 lighttpd: SQL injection and directory traversal vulnerabilities [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1075710
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update lighttpd’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

Top
More in Preporuke
Sigurnosni nedostaci Mozillinih proizvoda Firefox, Thunderbird i SeaMonkey

Otkriveni su sigurnosni nedostaci Mozillinih proizvoda Firefox, Thunderbird i SeaMonkey za operacijski sustav Suse. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje...

Close