httpd:2.4 security and bug fix update
エラータID: AXSA:2022-3552:01
リリース日:
2022/07/15 Friday - 08:29
題名:
httpd:2.4 security and bug fix update
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- httpd には、巧妙に細工されたダイジェスト認証時に付与する
ナンスによってスタックオーバーフローに至る脆弱性があります。
(CVE-2020-35452)
- httpd には、細工した HTTP/2 リクエストを送信した場合、
検証が迂回され mod_proxy によって要求が転送される欠陥があり、
リクエストの分割やキャッシュポイゾニングに至る脆弱性が
あります。(CVE-2021-33193)
- httpd には、巧妙に細工したリクエスト URI パスによって
mod_proxy_uwsgi モジュールが範囲外メモリを読み取り
クラッシュする問題があり、サービス拒否攻撃が可能となる
脆弱性があります。(CVE-2021-36160)
- httpd には、細工した URI を送信した際、ProxyRequest
ディレクティブを有効にしてフォワードプロキシを設定した
サーバーでは NULL ポインタデリファレンスによるクラッシュの発生、
また、フォワードプロキシおよびリバースプロキシを混在する
設定としたサーバーでは UNIX ドメインソケットとして定義した
エンドポイントへの転送を許可する SSRF (Server Side Request
Forgery) 攻撃が可能となる脆弱性があります。(CVE-2021-44224)
Modularity name: httpd
Stream name: 2.4
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
CVE-2021-33193
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
CVE-2021-36160
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
CVE-2021-44224
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
追加情報:
N/A
ダウンロード:
SRPMS
- httpd-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.src.rpm
MD5: 89d955d4bd7cac67e6cb102c605a4a0b
SHA-256: b6b7866da20c255832c0c27d439554ec3f5fdbe07ef65a32177264cc60e539c4
Size: 6.92 MB - mod_http2-1.15.7-5.module+el8+1489+4574cac0.src.rpm
MD5: e4592a0c8c83e8e055c214d72727c4dd
SHA-256: 85776222169f0b58d634469ab2717d05662f90304954905b90479b4395465a82
Size: 1.01 MB - mod_md-2.0.8-8.module+el8+1489+4574cac0.src.rpm
MD5: 32dc5ae886438b391914ca7bacd72664
SHA-256: 77682edfc60794c23e0f4adc8a8967ead7d4ccab1e7dbf27840562fd0ce41b31
Size: 635.32 kB
Asianux Server 8 for x86_64
- mod_ssl-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.x86_64.rpm
MD5: 763fa0bde4b3b695c184cb8156b4ceb5
SHA-256: 3e20d2a8609315f012f910379508f4b1084b2164f12be4f513c43858198ecee9
Size: 136.47 kB - mod_session-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.x86_64.rpm
MD5: c501448bddc3cc4c6f531cc93f3dacc6
SHA-256: d2f260f10020da40e1bd230152a4ecb0f94010856b40acf7b52d6983b41868db
Size: 73.97 kB - mod_ldap-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.x86_64.rpm
MD5: 1892cc9699845e2c7fe4fda351de7ddf
SHA-256: 20e10c52d28220997d44fc0ce1523c6fc47f9248ea855dfdf5783e5104b21840
Size: 85.15 kB - httpd-debugsource-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.x86_64.rpm
MD5: 6ff4473e1dc75e6f87de6c016075ac23
SHA-256: ca04fe926c3a666a54cb5f7484cbaacaed39cbd2973d44326b5b410dce0000ec
Size: 1.45 MB - httpd-tools-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.x86_64.rpm
MD5: 1ca09706d7539300fe91c6815a6caffe
SHA-256: 3ce015c3a525914ed47aa03f4ce685389fd4fe4cc1280dd5d2c66c056d6bf4eb
Size: 107.06 kB - httpd-devel-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.x86_64.rpm
MD5: cb28098ce69fe29d333306749b258018
SHA-256: bbcbe8a6d8d4d82e3c0164580fe0133a1f4c279710b5ef571c9d063554cd2928
Size: 222.93 kB - httpd-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.x86_64.rpm
MD5: 2ae460aeefaa747181bc6ade67d42817
SHA-256: 33c31c56c3fd47c2c4481d4171324b29a46d6a5801450b4e9c0f0c99d75a003d
Size: 1.41 MB - mod_proxy_html-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.x86_64.rpm
MD5: 089dd721ecf3cdcb00bb7adbdad8aae6
SHA-256: 784ede58735bf2206e024ba120dfd59204cbd3aa4a2e3a739a2c9788f017b8bc
Size: 62.27 kB - httpd-manual-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.noarch.rpm
MD5: acbeb88ff47974dd405f0f36f6aaee1e
SHA-256: 2c485d2672f6b7411583f1de4d1fb67635de2c64a2df3702a5a221f4bccbfd66
Size: 2.38 MB - httpd-filesystem-2.4.37-47.module+el8+1489+4574cac0.1.ML.1.noarch.rpm
MD5: 9f9e4dd6f0ae34918705290ee4820ee5
SHA-256: 249d90f8b614bf4f407c0a3c7a87b605c6ca76496a23e52826be9faabed0d736
Size: 39.85 kB - mod_http2-1.15.7-5.module+el8+1489+4574cac0.x86_64.rpm
MD5: cd3e3fb3d739824de5356fb5d4bc2c07
SHA-256: 10374d23735beaf1d79e96a77207160ae61240256ff53cf123d2a42831533b9a
Size: 153.30 kB - mod_http2-debugsource-1.15.7-5.module+el8+1489+4574cac0.x86_64.rpm
MD5: 8b92598eb75b67d3df2a11e5504ca2a6
SHA-256: 3fdae4373d2625b52117f060c7928f228749bf435ee992e1359a30fd1f3ee08a
Size: 146.76 kB - mod_md-debugsource-2.0.8-8.module+el8+1489+4574cac0.x86_64.rpm
MD5: 4330d5468888151864772cff151edf7c
SHA-256: b299e854efbdbff62c985a45c07b2c5ccb500dcca3d224c47fca70b426816380
Size: 126.24 kB - mod_md-2.0.8-8.module+el8+1489+4574cac0.x86_64.rpm
MD5: 0d56b42917ad78622d563cd270400b53
SHA-256: e853bb44e53a4c0981a8d424e883e033f19c50f12ecc0390c971d8fac204e5ea
Size: 183.57 kB