httpd24-1.1-18.AXS4, httpd24-httpd-2.4.27-8.AXS4
エラータID: AXSA:2017-2405:01
The Apache HTTP Server is a powerful, efficient, and extensible web server. The
httpd24 packages provide a recent stable release of version 2.4 of the Apache
HTTP Server, along with the mod_auth_kerb module.
The following packages have been upgraded to a later upstream version:
httpd24-httpd (2.4.27). (BZ#1461819)
Security Fix(es):
* A use-after-free flaw was found in the way httpd handled invalid and
previously unregistered HTTP methods specified in the Limit directive used in an
.htaccess file. A remote attacker could possibly use this flaw to disclose
portions of the server memory, or cause httpd child process to crash.
(CVE-2017-9798)
Asianux would like to thank Hanno Böck for reporting this issue.
Bug Fix(es):
* The httpd package installation script tried to create both the "apache" user
and group in a single "useradd" command. Consequently, when the "apache" group
had already been created on the system, the command failed, and the "apache"
user was not created. To fix this bug, the "apache" group is now created by a
separate command, and the "apache" user is correctly created during httpd
installation even when the "apache" group exists. (BZ#1486843)
* When installing the httpd24 Software Collection using the "yum" command, if
the "apache" group already existed on the system with GID other than 48, the
"apache" user was not created. This update fixes the bug. (BZ#1487164)
* With this update, it is possible to run the mod_rewrite external mapping
program as a non-root user. (BZ#1486832)
* On a Asianux Server 4 system, when the httpd service was stopped twice in a
row by running the "service httpd stop" command, a misleading message was
returned: "Stopping httpd: [FAILED]". This bug has been fixed. (BZ#1418395)
* When the "service httpd24-httpd graceful" command was used on Asianux Server
7 while the httpd24-httpd service was not running, the daemon was started
without being tracked by systemd. As a consequence, the daemon ran in an
incorrect SELinux domain. This bug has been fixed, and the httpd daemon runs in
the correct SELinux domain in the described scenario. (BZ#1440858)
Enhancement(s):
* With this update, the mod_ssl module supports the ALPN protocol on Asianux
Server 7.4 and later versions. (BZ#1327548)
For further details, see the Asianux Software Collections 3.0 Release Notes
linked from the References section.
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process
memory if the Limit directive can be set in a user's .htaccess file, or
if httpd.conf has certain misconfigurations, aka Optionsbleed. This
affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27.
The attacker sends an unauthenticated OPTIONS HTTP request when
attempting to read secret data. This is a use-after-free issue and thus
secret data is not always sent, and the specific data depends on many
factors including configuration. Exploitation with .htaccess can be
blocked with a patch to the ap_limit_section function in server/core.c.
Update packages.
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
N/A
SRPMS
- httpd24-httpd-2.4.27-8.AXS4.src.rpm
MD5: 1087a1d6cac42d42ebb3208fe6502ea8
SHA-256: 3a60e8f376a11fa6b1c6fe41dd85182b1ff1571c7422c70064efcca5da177199
Size: 6.32 MB - httpd24-1.1-18.AXS4.src.rpm
MD5: ff4a9a6cfa0a23e19ec7394a772f3aea
SHA-256: 53ed7fe31ac01d86d7143237f8b7553523d653356513154133864f7c3044545f
Size: 14.24 kB
Asianux Server 4 for x86_64
- httpd24-httpd-2.4.27-8.AXS4.x86_64.rpm
MD5: 4a16ba91c987704207203d646bd4459e
SHA-256: 29a93edd8aa3d3b3dc789b4c55ef066cdbc5423644cb5e465147af1b45c489ac
Size: 1.25 MB - httpd24-httpd-devel-2.4.27-8.AXS4.x86_64.rpm
MD5: cb37a6f98a083e824902f720a6e875d9
SHA-256: 24721f0319994ab3f384e58b9bdd05880e86f74e798eb6ec176b33abda1197b8
Size: 204.80 kB - httpd24-httpd-manual-2.4.27-8.AXS4.noarch.rpm
MD5: 32dbb2962e9d2e62ac7db9584ecc0989
SHA-256: 4a3096d2fc922b3d32a25ec653fabee72ee4573fe45f1fca00d73633826b0bd2
Size: 2.36 MB - httpd24-httpd-tools-2.4.27-8.AXS4.x86_64.rpm
MD5: 6cb9b8c95efcb91659c71c57f5254669
SHA-256: 2949f4ca9ce6228b58322c01c072038b7e1b224284bea9a29a0837f97bdc837c
Size: 80.60 kB - httpd24-mod_ldap-2.4.27-8.AXS4.x86_64.rpm
MD5: 434d81464dda7cb8c2ea816588f65025
SHA-256: 4adc523ac445b87586d2782b0dc80afda237e93175a885e6f4f809330c0f0455
Size: 64.05 kB - httpd24-mod_proxy_html-2.4.27-8.AXS4.x86_64.rpm
MD5: 7bbf00e5c4a427245ba15893a11d49b7
SHA-256: 6bedb2886d5ad2582438ad43445f8ee307dd5bd078808db90f6b8efd283c445d
Size: 42.28 kB - httpd24-mod_session-2.4.27-8.AXS4.x86_64.rpm
MD5: 38474322392018e30c86ca1d447aa8e8
SHA-256: 460bb19295c10d716ffb0c3d31330805019aa7a788e369a2defe19ccb52ff1d9
Size: 50.04 kB - httpd24-mod_ssl-2.4.27-8.AXS4.x86_64.rpm
MD5: c67aba08ad510e96cd9fae15ce3eef12
SHA-256: 2a4a5060b3c6e49cd26a42c7fd3828fd9321330a5d453004f3586b17697333b6
Size: 105.54 kB - httpd24-1.1-18.AXS4.x86_64.rpm
MD5: 0966b45dc1f51d022d162f5ec2cf918b
SHA-256: 12a880bc248d9dad957e9fa20ef707b45bdbf245f3aef3506925c84d37d5cbeb
Size: 3.73 kB - httpd24-runtime-1.1-18.AXS4.x86_64.rpm
MD5: a2469d279c986aea3a7a9d09c82fdaf4
SHA-256: c31de6fc8c39fc798dc517e0b8bc5d1579689a52bfee7ba2ec0518187b059809
Size: 1.03 MB