Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Apache
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Apache
ID: USN-4994-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, Ubuntu 21.04
Datum: Di, 22. Juni 2021, 07:48
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
Applikationen: Apache

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6681652736299234872==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="PwV7IbWUviRiAtU30Ri9npoeuMwJytBLE"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--PwV7IbWUviRiAtU30Ri9npoeuMwJytBLE
Content-Type: multipart/mixed;
boundary="1K9jnnLJQ6FOtKESoscrMZS7W7AzAEuAe";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <b2fb517b-85e0-fae6-2031-ff35df7fba88@canonical.com>
Subject: [USN-4994-1] Apache HTTP Server vulnerabilities

--1K9jnnLJQ6FOtKESoscrMZS7W7AzAEuAe
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4994-1
June 21, 2021

apache2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Apache HTTP Server.

Software Description:
- apache2: Apache HTTP server

Details:

Marc Stern discovered that the Apache mod_proxy_http module incorrectly
handled certain requests. A remote attacker could possibly use this issue
to cause Apache to crash, resulting in a denial of service. This issue only
affected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2020-13950)

Antonio Morales discovered that the Apache mod_auth_digest module
incorrectly handled certain Digest nonces. A remote attacker could possibly
use this issue to cause Apache to crash, resulting in a denial of service.
(CVE-2020-35452)

Antonio Morales discovered that the Apache mod_session module incorrectly
handled certain Cookie headers. A remote attacker could possibly use this
issue to cause Apache to crash, resulting in a denial of service.
(CVE-2021-26690)

Christophe Jaillet discovered that the Apache mod_session module
incorrectly handled certain SessionHeader values. A remote attacker could
use this issue to cause Apache to crash, resulting in a denial of service,
or possibly execute arbitrary code. (CVE-2021-26691)

Christoph Anton Mitterer discovered that the new MergeSlashes configuration
option resulted in unexpected behaviour in certain situations.
(CVE-2021-30641)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
apache2 2.4.46-4ubuntu1.1
apache2-bin 2.4.46-4ubuntu1.1

Ubuntu 20.10:
apache2 2.4.46-1ubuntu1.2
apache2-bin 2.4.46-1ubuntu1.2

Ubuntu 20.04 LTS:
apache2 2.4.41-4ubuntu3.3
apache2-bin 2.4.41-4ubuntu3.3

Ubuntu 18.04 LTS:
apache2 2.4.29-1ubuntu4.16
apache2-bin 2.4.29-1ubuntu4.16

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-4994-1
CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-26691,
CVE-2021-30641

Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.46-4ubuntu1.1
https://launchpad.net/ubuntu/+source/apache2/2.4.46-1ubuntu1.2
https://launchpad.net/ubuntu/+source/apache2/2.4.41-4ubuntu3.3
https://launchpad.net/ubuntu/+source/apache2/2.4.29-1ubuntu4.16


--1K9jnnLJQ6FOtKESoscrMZS7W7AzAEuAe--

--PwV7IbWUviRiAtU30Ri9npoeuMwJytBLE
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=K79X
-----END PGP SIGNATURE-----

--PwV7IbWUviRiAtU30Ri9npoeuMwJytBLE--


--===============6681652736299234872==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============6681652736299234872==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung