Описание
Security update for apache2
This update for apache2 fixes the following security issues:
Security issues fixed:
- CVE-2016-0736: Protect mod_session_crypto data with a MAC to prevent padding oracle attacks (bsc#1016712).
- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash, resulting in DoS (bsc#1016714).
- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain misinterpretation (bsc#1016715).
Bugfixes:
- Add missing copy of hcuri and hcexpr from the worker to the health check worker (bsc#1019380).
Список пакетов
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP2
Ссылки
- Link for SUSE-SU-2017:0797-1
- E-Mail link for SUSE-SU-2017:0797-1
- SUSE Security Ratings
- SUSE Bug 1016712
- SUSE Bug 1016714
- SUSE Bug 1016715
- SUSE Bug 1019380
- SUSE CVE CVE-2016-0736 page
- SUSE CVE CVE-2016-2161 page
- SUSE CVE CVE-2016-8743 page
Описание
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
Затронутые продукты
Ссылки
- CVE-2016-0736
- SUSE Bug 1016712
- SUSE Bug 1033513
Описание
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
Затронутые продукты
Ссылки
- CVE-2016-2161
- SUSE Bug 1016714
- SUSE Bug 1033513
Описание
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
Затронутые продукты
Ссылки
- CVE-2016-8743
- SUSE Bug 1016715
- SUSE Bug 1033513
- SUSE Bug 1086774
- SUSE Bug 1104826
- SUSE Bug 930944