Описание
Security update for apache2
This update for apache2 fixes several issues.
These security issues were fixed:
- CVE-2017-9798: Prevent use-after-free use of memory that allowed for an information leak via OPTIONS (bsc#1058058)
- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest could have lead to leakage of potentially confidential information, and a segfault in other cases resulting in DoS (bsc#1048576).
- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type response header (bsc#1045060).
- CVE-2017-3169: mod_ssl may dereferenced a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS (bsc#1045062).
- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have lead to authentication requirements being bypassed (bsc#1045065).
These non-security issues were fixed:
- remove /usr/bin/http2 symlink only during apache2 package uninstall, not upgrade (bsc#1041830)
- gensslcert: use hostname when fqdn is too long (bsc#1035829)
- add NotifyAccess=all to service file (bsc#980663)
Список пакетов
SUSE Linux Enterprise Server 12-LTSS
Ссылки
- Link for SUSE-SU-2017:2756-1
- E-Mail link for SUSE-SU-2017:2756-1
- SUSE Security Ratings
- SUSE Bug 1035829
- SUSE Bug 1041830
- SUSE Bug 1045060
- SUSE Bug 1045062
- SUSE Bug 1045065
- SUSE Bug 1048576
- SUSE Bug 1058058
- SUSE Bug 980663
- SUSE CVE CVE-2017-3167 page
- SUSE CVE CVE-2017-3169 page
- SUSE CVE CVE-2017-7679 page
- SUSE CVE CVE-2017-9788 page
- SUSE CVE CVE-2017-9798 page
Описание
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
Затронутые продукты
Ссылки
- CVE-2017-3167
- SUSE Bug 1045065
- SUSE Bug 1078450
Описание
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
Затронутые продукты
Ссылки
- CVE-2017-3169
- SUSE Bug 1045062
- SUSE Bug 1078450
Описание
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
Затронутые продукты
Ссылки
- CVE-2017-7679
- SUSE Bug 1045060
- SUSE Bug 1057861
- SUSE Bug 1078450
Описание
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
Затронутые продукты
Ссылки
- CVE-2017-9788
- SUSE Bug 1048576
Описание
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
Затронутые продукты
Ссылки
- CVE-2017-9798
- SUSE Bug 1058058
- SUSE Bug 1060757
- SUSE Bug 1077582
- SUSE Bug 1078450
- SUSE Bug 1089997