httpd-2.4.6-95.0.1.el7.AXS7

エラータID: AXSA:2020-639:02

Release date: 
Thursday, October 8, 2020 - 09:37
Subject: 
httpd-2.4.6-95.0.1.el7.AXS7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications (CVE-2018-1283)

* httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS (CVE-2018-1303)

* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)

* httpd: bypass with a trailing newline in the file name (CVE-2017-15715)

* httpd: mod_rewrite potential open redirect (CVE-2019-10098)

* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Asianux Server 7.9 Release Notes linked from the References section.

CVE-2017-15715
In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
CVE-2018-1303
A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.
CVE-2019-10098
In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.
CVE-2020-1927
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
CVE-2020-1934
In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. httpd-2.4.6-95.0.1.el7.AXS7.src.rpm
    MD5: cef60ce4be6579b4e3b961d0f08a38b1
    SHA-256: a3c1e883f1625c29d3fef9ef77e163ce07d9acd8ba9d2de8de67519c179f4592
    Size: 4.97 MB

Asianux Server 7 for x86_64
  1. httpd-2.4.6-95.0.1.el7.AXS7.x86_64.rpm
    MD5: 3c9c5033a81b25cd8c4536a156f1f8f8
    SHA-256: f6d9cba643c6a25742e96e3a04a6dc0966d973fe3c85ee1ab4af5d1d0701915d
    Size: 1.19 MB
  2. httpd-devel-2.4.6-95.0.1.el7.AXS7.x86_64.rpm
    MD5: b1ff7c7e94f9dd6a10cbdc4dfa5948bb
    SHA-256: 090aed3e9c93954741d4f8df6746e07b42337696b0de3594ed80db75e5805d5b
    Size: 198.05 kB
  3. httpd-manual-2.4.6-95.0.1.el7.AXS7.noarch.rpm
    MD5: 702f73358f575f732ec347b083dba9db
    SHA-256: e9eebb88f3ea138edaa9044299821201df8b5ced827cedc5849c3bf4a3e66357
    Size: 1.34 MB
  4. httpd-tools-2.4.6-95.0.1.el7.AXS7.x86_64.rpm
    MD5: f1340e3e1e7907f6255c74965933b79e
    SHA-256: 1b054c2f57864fb63be6706b2ca323f740f739b205c94fb981381a19f2d8288e
    Size: 91.97 kB
  5. mod_session-2.4.6-95.0.1.el7.AXS7.x86_64.rpm
    MD5: 688bb23fa37b20b55d9b9763dcd7272a
    SHA-256: b9ca121648befba857309e2a42274899e518f817d43a020b21c5a0290fb802ba
    Size: 62.02 kB
  6. mod_ssl-2.4.6-95.0.1.el7.AXS7.x86_64.rpm
    MD5: ed737c8feb97ebf9d321f02eb9f037d4
    SHA-256: 45b56fd104a63294d6e6146283965a7bb470f4c66fd9bbc5506bf1bac4436828
    Size: 113.12 kB