Lucene search

K
slackwareSlackware Linux ProjectSSA-2021-158-01
HistoryJun 07, 2021 - 7:07 p.m.

[slackware-security] httpd

2021-06-0719:07:12
Slackware Linux Project
www.slackware.com
55

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.689 Medium

EPSS

Percentile

98.0%

New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:

patches/packages/httpd-2.4.48-i586-1_slack14.2.txz: Upgraded.
This release contains security fixes and improvements.
mod_http2: Fix a potential NULL pointer dereference.
Unexpected <Location> section matching with ‘MergeSlashes OFF’.
mod_auth_digest: possible stack overflow by one nul byte while validating
the Digest nonce.
mod_session: Fix possible crash due to NULL pointer dereference, which
could be used to cause a Denial of Service with a malicious backend
server and SessionHeader.
mod_session: Fix possible crash due to NULL pointer dereference, which
could be used to cause a Denial of Service.
mod_proxy_http: Fix possible crash due to NULL pointer dereference, which
could be used to cause a Denial of Service.
mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end
negotiation.
For more information, see:
https://vulners.com/cve/CVE-2021-31618
https://vulners.com/cve/CVE-2021-30641
https://vulners.com/cve/CVE-2020-35452
https://vulners.com/cve/CVE-2021-26691
https://vulners.com/cve/CVE-2021-26690
https://vulners.com/cve/CVE-2020-13950
https://vulners.com/cve/CVE-2019-17567
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.48-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.48-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/httpd-2.4.48-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/httpd-2.4.48-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/httpd-2.4.48-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/httpd-2.4.48-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.48-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.48-x86_64-1.txz

MD5 signatures:

Slackware 14.0 package:
4f0a55562611068696fc6226b8e93557 httpd-2.4.48-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
9f8fe54dc02cb68a13d44b1ad79e4ebb httpd-2.4.48-x86_64-1_slack14.0.txz

Slackware 14.1 package:
c334d35be6d30453999c2ad23db88475 httpd-2.4.48-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
cf7e418101644df490a1a5e3992cf230 httpd-2.4.48-x86_64-1_slack14.1.txz

Slackware 14.2 package:
4ff2c515e62b318f0dd271505bbc66d5 httpd-2.4.48-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
19874d3b39ed822829b586e1d58c502c httpd-2.4.48-x86_64-1_slack14.2.txz

Slackware -current package:
1a5048b8fd29b6a5bf71ef513e12285d n/httpd-2.4.48-i586-1.txz

Slackware x86_64 -current package:
2a9add06087b868c2c5e9872d9a0a36a n/httpd-2.4.48-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg httpd-2.4.48-i586-1_slack14.2.txz

Then, restart Apache httpd:

> /etc/rc.d/rc.httpd stop
> /etc/rc.d/rc.httpd start

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.689 Medium

EPSS

Percentile

98.0%