Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:2004-1

Опубликовано: 17 июн. 2021
Источник: suse-cvrf

Описание

Security update for apache2

This update for apache2 fixes the following issues:

  • CVE-2021-30641: Fixed MergeSlashes regression (bsc#1187174)
  • CVE-2021-31618: Fixed NULL pointer dereference on specially crafted HTTP/2 request (bsc#1186924)
  • CVE-2020-35452: Fixed Single zero byte stack overflow in mod_auth_digest (bsc#1186922)
  • CVE-2021-26690: Fixed mod_session NULL pointer dereference in parser (bsc#1186923)
  • CVE-2021-26691: Fixed Heap overflow in mod_session (bsc#1187017)
  • Fixed potential content spoofing with default error pages (bsc#1182703)
  • Fixed for an issue when 'gensslcert' does not set CA:True. (bsc#1180530)

Список пакетов

Image SLES15-SP1-SAPCAL-Azure
apache2-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-EC2-HVM
apache2-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-GCE
apache2-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
SUSE Enterprise Storage 6
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Linux Enterprise Server 15 SP1-BCL
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Linux Enterprise Server 15 SP1-LTSS
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Linux Enterprise Server 15-LTSS
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Linux Enterprise Server for SAP Applications 15
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Manager Proxy 4.0
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Manager Retail Branch Server 4.0
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1
SUSE Manager Server 4.0
apache2-2.4.33-3.50.1
apache2-devel-2.4.33-3.50.1
apache2-doc-2.4.33-3.50.1
apache2-prefork-2.4.33-3.50.1
apache2-utils-2.4.33-3.50.1
apache2-worker-2.4.33-3.50.1

Описание

In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.


Затронутые продукты
Image SLES15-SP1-SAPCAL-Azure:apache2-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-prefork-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-utils-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-EC2-HVM:apache2-2.4.33-3.50.1

Ссылки

Описание

Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow


Затронутые продукты
Image SLES15-SP1-SAPCAL-Azure:apache2-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-prefork-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-utils-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-EC2-HVM:apache2-2.4.33-3.50.1

Ссылки

Описание

Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service


Затронутые продукты
Image SLES15-SP1-SAPCAL-Azure:apache2-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-prefork-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-utils-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-EC2-HVM:apache2-2.4.33-3.50.1

Ссылки

Описание

In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow


Затронутые продукты
Image SLES15-SP1-SAPCAL-Azure:apache2-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-prefork-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-utils-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-EC2-HVM:apache2-2.4.33-3.50.1

Ссылки

Описание

Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'


Затронутые продукты
Image SLES15-SP1-SAPCAL-Azure:apache2-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-prefork-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-utils-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-EC2-HVM:apache2-2.4.33-3.50.1

Ссылки

Описание

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.


Затронутые продукты
Image SLES15-SP1-SAPCAL-Azure:apache2-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-prefork-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-Azure:apache2-utils-2.4.33-3.50.1
Image SLES15-SP1-SAPCAL-EC2-HVM:apache2-2.4.33-3.50.1

Ссылки
Уязвимость SUSE-SU-2021:2004-1