Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:0974-1

Опубликовано: 10 апр. 2015
Источник: suse-cvrf

Описание

Security update for apache2

Apache2 updated to fix four security issues and one non-security bug.

The following vulnerabilities have been fixed:

  • mod_headers rules could be bypassed via chunked requests. Adds 'MergeTrailers' directive to restore legacy behavior. (bsc#871310, CVE-2013-5704)
  • An empty value in Content-Type could lead to a crash through a null pointer dereference and a denial of service. (bsc#899836, CVE-2014-3581)
  • Remote attackers could bypass intended access restrictions in mod_lua LuaAuthzProvider when multiple Require directives with different arguments are used. (bsc#909715, CVE-2014-8109)
  • Remote attackers could cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function. (bsc#918352, CVE-2015-0228)

The following non-security issues have been fixed:

  • The Apache2 systemd service file was changed to fix situation where apache wouldn't start at boot when using an encrypted certificate because the user wasn't prompted for password during boot. (bsc#792309)

Additionally, mod_imagemap is now included by default in the package. (bsc#923090)

Список пакетов

SUSE Linux Enterprise Server 12
apache2-2.4.10-12.1
apache2-doc-2.4.10-12.1
apache2-example-pages-2.4.10-12.1
apache2-prefork-2.4.10-12.1
apache2-utils-2.4.10-12.1
apache2-worker-2.4.10-12.1
SUSE Linux Enterprise Server for SAP Applications 12
apache2-2.4.10-12.1
apache2-doc-2.4.10-12.1
apache2-example-pages-2.4.10-12.1
apache2-prefork-2.4.10-12.1
apache2-utils-2.4.10-12.1
apache2-worker-2.4.10-12.1
SUSE Linux Enterprise Software Development Kit 12
apache2-devel-2.4.10-12.1

Описание

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."


Затронутые продукты
SUSE Linux Enterprise Server 12:apache2-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-12.1

Ссылки

Описание

The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.


Затронутые продукты
SUSE Linux Enterprise Server 12:apache2-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-12.1

Ссылки

Описание

mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.


Затронутые продукты
SUSE Linux Enterprise Server 12:apache2-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-12.1

Ссылки

Описание

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.


Затронутые продукты
SUSE Linux Enterprise Server 12:apache2-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-12.1
SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-12.1

Ссылки
Уязвимость SUSE-SU-2015:0974-1