Lucene search

K
slackwareSlackware Linux ProjectSSA-2017-194-01
HistoryJul 13, 2017 - 7:27 p.m.

[slackware-security] httpd

2017-07-1319:27:26
Slackware Linux Project
www.slackware.com
20

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

0.468 Medium

EPSS

Percentile

97.4%

New httpd packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:

patches/packages/httpd-2.4.27-i586-1_slack14.2.txz: Upgraded.
This update fixes two security issues:
Read after free in mod_http2 (CVE-2017-9789)
Uninitialized memory reflection in mod_auth_digest (CVE-2017-9788)
Thanks to Robert Swiecki for reporting these issues.
For more information, see:
https://httpd.apache.org/security/vulnerabilities_24.html
https://vulners.com/cve/CVE-2017-9789
https://vulners.com/cve/CVE-2017-9788
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/httpd-2.2.34-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/httpd-2.2.34-x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/httpd-2.2.34-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/httpd-2.2.34-x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/httpd-2.2.34-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/httpd-2.2.34-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.27-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.27-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/httpd-2.4.27-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/httpd-2.4.27-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/httpd-2.4.27-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/httpd-2.4.27-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.27-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.27-x86_64-1.txz

MD5 signatures:

Slackware 13.0 package:
3db340e1ff161eb2708edf71ad8424c6 httpd-2.2.34-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
3f3c7969f5e962c8d980cc51f80f9178 httpd-2.2.34-x86_64-1_slack13.0.txz

Slackware 13.1 package:
43bb52b8cee984a2ac36bd1894401386 httpd-2.2.34-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
9b13249216775565f7c5c9f30f86b817 httpd-2.2.34-x86_64-1_slack13.1.txz

Slackware 13.37 package:
65595a5ce5f8793c555619227850b611 httpd-2.2.34-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
f148bc55401edb77b732bccba2a2df73 httpd-2.2.34-x86_64-1_slack13.37.txz

Slackware 14.0 package:
3ee333cfd30a0edb3c20a11d60c98a91 httpd-2.4.27-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
63a2474fc6407094736acc4f06b71a98 httpd-2.4.27-x86_64-1_slack14.0.txz

Slackware 14.1 package:
6398096a141e80565486401751007700 httpd-2.4.27-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
7440d7e5904ec0917f61ee13685e183c httpd-2.4.27-x86_64-1_slack14.1.txz

Slackware 14.2 package:
a396f73859eefe038fdbaa599fea201a httpd-2.4.27-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
7c140f09e3f99ddff7a72f25658e0b26 httpd-2.4.27-x86_64-1_slack14.2.txz

Slackware -current package:
919f887ef496d293057d3eedd47c5b79 n/httpd-2.4.27-i586-1.txz

Slackware x86_64 -current package:
73e6d2ee54f1201e0366af641bcf1b97 n/httpd-2.4.27-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg httpd-2.4.27-i586-1_slack14.2.txz

Then, restart Apache httpd:

> /etc/rc.d/rc.httpd stop
> /etc/rc.d/rc.httpd start

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

0.468 Medium

EPSS

Percentile

97.4%