SUSE-SU-2017:0731-1: moderate: Security update for lighttpd

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Mar 17 11:14:25 MDT 2017


   SUSE Security Update: Security update for lighttpd
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:0731-1
Rating:             moderate
References:         #932286 #981347 #990847 
Cross-References:   CVE-2015-3200 CVE-2016-1000212
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server for SAP 11-SP4
                    SUSE Linux Enterprise High Availability Extension 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that solves two vulnerabilities and has one
   errata is now available.

Description:


   This update for lighttpd fixes the following issues:

   Security issues fixed:

   - CVE-2016-1000212: Don't allow requests to set the HTTP_PROXY variable.
     As *CGI apps might pick it up and use it for outgoing requests.
     (bsc#990847)
   - CVE-2015-3200: Log injection via malformed base64 string in
     Authentication header. (bsc#932286)

   Bug fixes:

   - Add su directive to logrotate file as the directory is owned by
     lighttpd. (bsc#981347)
   - Fix out of bounds read in mod_scgi.


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-lighttpd-13033=1

   - SUSE Linux Enterprise Server for SAP 11-SP4:

      zypper in -t patch slesappsp4-lighttpd-13033=1

   - SUSE Linux Enterprise High Availability Extension 11-SP4:

      zypper in -t patch slehasp4-lighttpd-13033=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-lighttpd-13033=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      lighttpd-1.4.20-2.58.1
      lighttpd-mod_cml-1.4.20-2.58.1
      lighttpd-mod_magnet-1.4.20-2.58.1
      lighttpd-mod_mysql_vhost-1.4.20-2.58.1
      lighttpd-mod_rrdtool-1.4.20-2.58.1
      lighttpd-mod_trigger_b4_dl-1.4.20-2.58.1
      lighttpd-mod_webdav-1.4.20-2.58.1

   - SUSE Linux Enterprise Server for SAP 11-SP4 (ppc64 x86_64):

      lighttpd-mod_cml-1.4.20-2.58.1
      lighttpd-mod_magnet-1.4.20-2.58.1
      lighttpd-mod_mysql_vhost-1.4.20-2.58.1
      lighttpd-mod_rrdtool-1.4.20-2.58.1
      lighttpd-mod_trigger_b4_dl-1.4.20-2.58.1
      lighttpd-mod_webdav-1.4.20-2.58.1

   - SUSE Linux Enterprise High Availability Extension 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      lighttpd-1.4.20-2.58.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      lighttpd-debuginfo-1.4.20-2.58.1
      lighttpd-debugsource-1.4.20-2.58.1


References:

   https://www.suse.com/security/cve/CVE-2015-3200.html
   https://www.suse.com/security/cve/CVE-2016-1000212.html
   https://bugzilla.suse.com/932286
   https://bugzilla.suse.com/981347
   https://bugzilla.suse.com/990847



More information about the sle-updates mailing list