An apache update has been released for Slackware Linux
New apache packages are available for Slackware 8.1, 9.0, 9.1, and -current to fix security issues. These include a possible denial-of-service attack as well as the ability to possible pipe shell escapes through Apache's errorlog (which could create an exploit if the error log is read in a terminal program that does not filter such escapes). We recommend that sites running Apache upgrade to the new Apache package.
More details about these issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993
Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Wed May 12 13:06:39 PDT 2004
patches/packages/apache-1.3.29-i486-2.tgz: Patched four security issues
in the Apache web server as noted on http://httpd.apache.org.
These security fixes were backported from Apache 1.3.31:
In mod_digest, verify whether the nonce returned in the client
response is one we issued ourselves. This problem does not affect
mod_auth_digest. (CAN-2003-0987)
Escape arbitrary data before writing into the errorlog. (CAN-2003-0020)
Fix starvation issue on listening sockets where a short-lived connection
on a rarely-accessed listening socket will cause a child to hold the
accept mutex and block out new connections until another connection
arrives on that rarely-accessed listening socket. (CAN-2004-0174)
Fix parsing of Allow/Deny rules using IP addresses without a netmask;
issue is only known to affect big-endian 64-bit platforms (CAN-2003-0993)
For more details, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/apache-1.3.29-i386-2.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/apache-1.3.29-i386-2.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/apache-1.3.29-i486-2.tgz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/apache-1.3.31-i486-1.tgz
(these related packages are also available)
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/mod_ssl-2.8.17_1.3.31-i486-2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-4.3.6-i486-2.tgz
MD5 signatures:
+-------------+
Slackware 8.1 package:
53949a74ba3dd0a01271e3aa1178e082 apache-1.3.29-i386-2.tgz
Slackware 9.0 package:
64ede1f5637736842502301eb5bd727d apache-1.3.29-i386-2.tgz
Slackware 9.1 package:
ec5dad948d8b17b82b91d756a5c6b0f9 apache-1.3.29-i486-2.tgz
Slackware -current packages:
a925f8be7b8bbcb7e4a77e2ef755988a apache-1.3.31-i486-1.tgz
684626575e1c2a783b3d8d208876aab4 mod_ssl-2.8.17_1.3.31-i486-2.tgz
ad27d5f96281e11567184411b7c0720e php-4.3.6-i486-2.tgz
Installation instructions:
+------------------------+
First, stop apache:
# apachectl stop
Next, upgrade the Apache package as root:
(if you're running -current, upgrade mod_ssl and php as well)
# upgradepkg apache-1.3.29-i486-2.tgz
Finally, restart apache:
# apachectl start
Or, if you're running a secure server with mod_ssl:
# apachectl startssl
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
New apache packages are available for Slackware 8.1, 9.0, 9.1, and -current to fix security issues. These include a possible denial-of-service attack as well as the ability to possible pipe shell escapes through Apache's errorlog (which could create an exploit if the error log is read in a terminal program that does not filter such escapes). We recommend that sites running Apache upgrade to the new Apache package.
More details about these issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993
Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Wed May 12 13:06:39 PDT 2004
patches/packages/apache-1.3.29-i486-2.tgz: Patched four security issues
in the Apache web server as noted on http://httpd.apache.org.
These security fixes were backported from Apache 1.3.31:
In mod_digest, verify whether the nonce returned in the client
response is one we issued ourselves. This problem does not affect
mod_auth_digest. (CAN-2003-0987)
Escape arbitrary data before writing into the errorlog. (CAN-2003-0020)
Fix starvation issue on listening sockets where a short-lived connection
on a rarely-accessed listening socket will cause a child to hold the
accept mutex and block out new connections until another connection
arrives on that rarely-accessed listening socket. (CAN-2004-0174)
Fix parsing of Allow/Deny rules using IP addresses without a netmask;
issue is only known to affect big-endian 64-bit platforms (CAN-2003-0993)
For more details, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/apache-1.3.29-i386-2.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/apache-1.3.29-i386-2.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/apache-1.3.29-i486-2.tgz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/apache-1.3.31-i486-1.tgz
(these related packages are also available)
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/mod_ssl-2.8.17_1.3.31-i486-2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-4.3.6-i486-2.tgz
MD5 signatures:
+-------------+
Slackware 8.1 package:
53949a74ba3dd0a01271e3aa1178e082 apache-1.3.29-i386-2.tgz
Slackware 9.0 package:
64ede1f5637736842502301eb5bd727d apache-1.3.29-i386-2.tgz
Slackware 9.1 package:
ec5dad948d8b17b82b91d756a5c6b0f9 apache-1.3.29-i486-2.tgz
Slackware -current packages:
a925f8be7b8bbcb7e4a77e2ef755988a apache-1.3.31-i486-1.tgz
684626575e1c2a783b3d8d208876aab4 mod_ssl-2.8.17_1.3.31-i486-2.tgz
ad27d5f96281e11567184411b7c0720e php-4.3.6-i486-2.tgz
Installation instructions:
+------------------------+
First, stop apache:
# apachectl stop
Next, upgrade the Apache package as root:
(if you're running -current, upgrade mod_ssl and php as well)
# upgradepkg apache-1.3.29-i486-2.tgz
Finally, restart apache:
# apachectl start
Or, if you're running a secure server with mod_ssl:
# apachectl startssl
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com