Описание
Security update for apache2
This update for apache2 provides the following fixes:
Security issues fixed:
- CVE-2017-3167: In Apache use of httpd ap_get_basic_auth_pw() outside of the authentication phase could lead to authentication requirements bypass (bsc#1045065)
- CVE-2017-3169: In mod_ssl may have a dereference NULL pointer issue which could lead to denial of service (bsc#1045062)
- CVE-2017-7679: In mod_mime can buffer over-read by 1 byte, potentially leading to a crash or information disclosure (bsc#1045060)
Non-Security issues fixed:
- Remove /usr/bin/http2 symlink only during apache2 package uninstall, not upgrade. (bsc#1041830)
- In gensslcert, use hostname when fqdn is too long. (bsc#1035829)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Список пакетов
openSUSE Leap 42.2
Ссылки
- E-Mail link for openSUSE-SU-2017:1803-1
- SUSE Security Ratings
Описание
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
Затронутые продукты
Ссылки
- CVE-2017-3167
- SUSE Bug 1045065
- SUSE Bug 1078450
Описание
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
Затронутые продукты
Ссылки
- CVE-2017-3169
- SUSE Bug 1045062
- SUSE Bug 1078450
Описание
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
Затронутые продукты
Ссылки
- CVE-2017-7679
- SUSE Bug 1045060
- SUSE Bug 1057861
- SUSE Bug 1078450