drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in httpd
Name: |
Zwei Probleme in httpd |
|
ID: |
SSA:2021-354-01 |
|
Distribution: |
Slackware |
|
Plattformen: |
Slackware -current, Slackware x86_64 -current, Slackware 14.0, Slackware x86_64 14.0, Slackware 14.1, Slackware x86_64 14.1, Slackware 14.2, Slackware x86_64 14.2 |
|
Datum: |
Mo, 20. Dezember 2021, 22:29 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224 |
|
Applikationen: |
Apache |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] httpd (SSA:2021-354-01)
New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/httpd-2.4.52-i586-1_slack14.2.txz: Upgraded. SECURITY: CVE-2021-44790: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier (cve.mitre.org) A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. Credits: Chamal SECURITY: CVE-2021-44224: Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier (cve.mitre.org) A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). Credits: ae 1/4*a-o(R)e 1/4 TengMA(@Te3t123) For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224 (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 14.0: httpd-2.4.52-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: httpd-2.4.52-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: httpd-2.4.52-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: httpd-2.4.52-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2: httpd-2.4.52-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2: httpd-2.4.52-x86_64-1_slack14.2.txz
Updated package for Slackware -current: httpd-2.4.52-i586-1.txz
Updated package for Slackware x86_64 -current: httpd-2.4.52-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 14.0 package: 3f33dbe9e48f566aae45f8a56fcee09d httpd-2.4.52-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: b71b016aee508a43f29d343d20cf91fe httpd-2.4.52-x86_64-1_slack14.0.txz
Slackware 14.1 package: 9aee656af113bfdf6b3285e274802126 httpd-2.4.52-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 2d2de365767b26d8e74304aba13b0057 httpd-2.4.52-x86_64-1_slack14.1.txz
Slackware 14.2 package: 9a3a20287d0395057da257f96cc3087b httpd-2.4.52-i586-1_slack14.2.txz
Slackware x86_64 14.2 package: 78e4e8cff10fafa96a3e4a47930b960d httpd-2.4.52-x86_64-1_slack14.2.txz
Slackware -current package: 0cf640a7486c728b3b9e98a273740340 n/httpd-2.4.52-i586-1.txz
Slackware x86_64 -current package: d1aa0a02df15ce2d9408e0ae0d76c3bc n/httpd-2.4.52-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root: # upgradepkg httpd-2.4.52-i586-1_slack14.2.txz
Then, restart Apache httpd:
# /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAmHA3NMACgkQakRjwEAQIjNMBACfZ7jPRvXVitUcqnassLq8vY8s BzsAniKpxpOvyRXYxYB41hxni9QfrtdD =dz+Q -----END PGP SIGNATURE-----
|
|
|
|