Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Apache (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Apache (Aktualisierung)
ID: USN-5090-3
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 21.04
Datum: Di, 28. September 2021, 22:32
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
Applikationen: Apache
Update von: Mehrere Probleme in Apache

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============9129879303427871279==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="LvrWCkwCAUa0DLlpsPSqzjlIyf4O1wvEk"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--LvrWCkwCAUa0DLlpsPSqzjlIyf4O1wvEk
Content-Type: multipart/mixed;
boundary="srG4Hs7V1TpN6GZgOmT4iyuflXaCaBmxx";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <cc23d26b-c602-8eaa-49e4-7e65c959bd03@canonical.com>
Subject: [USN-5090-3] Apache HTTP Server regression

--srG4Hs7V1TpN6GZgOmT4iyuflXaCaBmxx
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-5090-3
September 28, 2021

apache2 regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

USN-5090-1 introduced a regression in Apache HTTP Server.

Software Description:
- apache2: Apache HTTP server

Details:

USN-5090-1 fixed vulnerabilities in Apache HTTP Server. One of the upstream
fixes introduced a regression in UDS URIs. This update fixes the problem.

Original advisory details:

James Kettle discovered that the Apache HTTP Server HTTP/2 module
incorrectly handled certain crafted methods. A remote attacker could
possibly use this issue to perform request splitting or cache poisoning
attacks. (CVE-2021-33193)
It was discovered that the Apache HTTP Server incorrectly handled certain
malformed requests. A remote attacker could possibly use this issue to
cause the server to crash, resulting in a denial of service.
(CVE-2021-34798)
Li Zhi Xin discovered that the Apache mod_proxy_uwsgi module incorrectly
handled certain request uri-paths. A remote attacker could possibly use
this issue to cause the server to crash, resulting in a denial of service.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 21.04.
(CVE-2021-36160)
It was discovered that the Apache HTTP Server incorrectly handled escaping
quotes. If the server was configured with third-party modules, a remote
attacker could use this issue to cause the server to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2021-39275)
It was discovered that the Apache mod_proxy module incorrectly handled
certain request uri-paths. A remote attacker could possibly use this issue
to cause the server to forward requests to arbitrary origin servers.
(CVE-2021-40438)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
apache2 2.4.46-4ubuntu1.3
apache2-bin 2.4.46-4ubuntu1.3

Ubuntu 20.04 LTS:
apache2 2.4.41-4ubuntu3.6
apache2-bin 2.4.41-4ubuntu3.6

Ubuntu 18.04 LTS:
apache2 2.4.29-1ubuntu4.18
apache2-bin 2.4.29-1ubuntu4.18

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5090-3
https://ubuntu.com/security/notices/USN-5090-1
https://launchpad.net/bugs/1945311

Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.46-4ubuntu1.3
https://launchpad.net/ubuntu/+source/apache2/2.4.41-4ubuntu3.6
https://launchpad.net/ubuntu/+source/apache2/2.4.29-1ubuntu4.18


--srG4Hs7V1TpN6GZgOmT4iyuflXaCaBmxx--

--LvrWCkwCAUa0DLlpsPSqzjlIyf4O1wvEk
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmFTKuIACgkQZWnYVadE
vpOPdxAAs4hmuSI1Pp4zlToDqGQfih1JxC3Nh9i1TtxXDpc3W29mo8039KRrgu/Y
uVCstR7LXbFVF4OyHNUeiC/+3DbHW7M71RISlwwrSxsoRBQEvsHNH4+XRHhtlO2x
FWwD0ueN/9gWdHUBIfxqsGLjLdQByapYNryQujuoF+IjncREatoJPrWFKFLwIDDx
uV+2S3LxW5hN5duFBtytr23Nqmfy+s4QYYVCy6nbYjO0FtOE3lQv16HYQIL9KY34
yG1FZru+KBcQD3hJNVg3PZDCsRUqzchJrza8a3q6utYZpSQ8X06K5/msDrKx9KTH
AeTUITPrCa4WAMxS4VBlD5vz6ZIC8s7N1Cg+F7qYBQ1XE5PQZe+Jk7GqTipJzpwy
LopXvMAezcYfqJX7RJVtlO5GFOpc3XYwcmX6EHurvnj9xRHC9OaFYByQssMXV18w
tzKq7FSXV2mItQ9DBEk53UAI6UGjggdQdqQ5auxOX8ELxjdZtLxPuIWYs4STbVYl
PBJbpSRrV6UlGME/tvTUGACsR9v8ujDdPFVBpa8OfpygKZ31uspMA3zzfdNDtfZG
u7q67oYCsYB10HKCMAoU9C/f/+vqvPurfCTiq3CNTj8JyCsQnfhtCunDSzVEgDwA
OijZ2WFbwbQm5YIzTO8KJwSc9mZUbm9+ACvkJZhvpcVks7HRIbI=
=DLal
-----END PGP SIGNATURE-----

--LvrWCkwCAUa0DLlpsPSqzjlIyf4O1wvEk--


--===============9129879303427871279==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============9129879303427871279==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung