Описание
Security update for apache2
This update for apache2 fixes the following issues:
- CVE-2024-36387: Fixed DoS by null pointer in websocket over HTTP/2 (bsc#1227272)
- CVE-2024-38475: Fixed improper escaping of output in mod_rewrite (bsc#1227268)
- CVE-2024-38476: Fixed server may use exploitable/malicious backend application output to run local handlers via internal redirect (bsc#1227269)
Список пакетов
Container bci/php-apache:latest
Container suse/manager/5.0/x86_64/proxy-httpd:latest
Container suse/manager/5.0/x86_64/server:latest
Container suse/registry:latest
Image SLES15-SP6-SAP
Image SLES15-SP6-SAP-Azure
Image SLES15-SP6-SAP-EC2
Image SLES15-SP6-SAP-GCE
Image SLES15-SP6-SAPCAL
Image SLES15-SP6-SAPCAL-Azure
Image SLES15-SP6-SAPCAL-EC2
Image SLES15-SP6-SAPCAL-GCE
SUSE Linux Enterprise Module for Basesystem 15 SP6
SUSE Linux Enterprise Module for Package Hub 15 SP6
SUSE Linux Enterprise Module for Server Applications 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2024:2597-1
- E-Mail link for SUSE-SU-2024:2597-1
- SUSE Security Ratings
- SUSE Bug 1227268
- SUSE Bug 1227269
- SUSE Bug 1227272
- SUSE CVE CVE-2024-36387 page
- SUSE CVE CVE-2024-38475 page
- SUSE CVE CVE-2024-38476 page
Описание
Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.
Затронутые продукты
Ссылки
- CVE-2024-36387
- SUSE Bug 1227272
Описание
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
Затронутые продукты
Ссылки
- CVE-2024-38475
- SUSE Bug 1227268
Описание
Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Затронутые продукты
Ссылки
- CVE-2024-38476
- SUSE Bug 1227269