-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  httpd (SSA:2021-280-01)

New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix a security issue.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/httpd-2.4.51-i586-1_slack14.2.txz:  Upgraded.
  SECURITY: CVE-2021-42013: Path Traversal and Remote Code
  Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete
  fix of CVE-2021-41773) (cve.mitre.org)
  It was found that the fix for CVE-2021-41773 in Apache HTTP
  Server 2.4.50 was insufficient.  An attacker could use a path
  traversal attack to map URLs to files outside the directories
  configured by Alias-like directives.
  If files outside of these directories are not protected by the
  usual default configuration "require all denied", these requests
  can succeed. If CGI scripts are also enabled for these aliased
  pathes, this could allow for remote code execution.
  This issue only affects Apache 2.4.49 and Apache 2.4.50 and not
  earlier versions.
  Credits: Reported by Juan Escobar from Dreamlab Technologies,
  Fernando MuA+-oz from NULL Life CTF Team, and Shungo Kumasaka
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42013
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.

Updated package for Slackware 14.0:

Updated package for Slackware x86_64 14.0:

Updated package for Slackware 14.1:

Updated package for Slackware x86_64 14.1:

Updated package for Slackware 14.2:

Updated package for Slackware x86_64 14.2:

Updated package for Slackware -current:

Updated package for Slackware x86_64 -current:


MD5 signatures:
+-------------+

Slackware 14.0 package:
3dc9af339945226035885f4896e7c443  httpd-2.4.51-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
621539c82e9f23a2b63ec4ad4fe60fa1  httpd-2.4.51-x86_64-1_slack14.0.txz

Slackware 14.1 package:
b05881b3d8d5ce4edc267c1ab6f70be1  httpd-2.4.51-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
7be7108c6acbf118df01c06632242607  httpd-2.4.51-x86_64-1_slack14.1.txz

Slackware 14.2 package:
d1d85a41387af3f18b777d000a023288  httpd-2.4.51-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
7909fd6353790b8cb3dd2d083ea7d6f3  httpd-2.4.51-x86_64-1_slack14.2.txz

Slackware -current package:
169e11d499afa90780a1d8d9c23a5a94  n/httpd-2.4.51-i586-1.txz

Slackware x86_64 -current package:
c761e7d4fbc8198a21025b804a962874  n/httpd-2.4.51-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg httpd-2.4.51-i586-1_slack14.2.txz

Then, restart Apache httpd:

# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start


+-----+

Slackware: 2021-280-01: httpd Security Update

October 7, 2021
New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue

Summary

Here are the details from the Slackware 14.2 ChangeLog: patches/packages/httpd-2.4.51-i586-1_slack14.2.txz: Upgraded. SECURITY: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (cve.mitre.org) It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions. Credits: Reported by Juan Escobar from Dreamlab Technologies, Fernando MuA+-oz from NULL Life CTF Team, and Shungo Kumasaka For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42013 (* Security fix *)

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org/) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for additional mirror sites near you.
Updated package for Slackware 14.0:
Updated package for Slackware x86_64 14.0:
Updated package for Slackware 14.1:
Updated package for Slackware x86_64 14.1:
Updated package for Slackware 14.2:
Updated package for Slackware x86_64 14.2:
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:

MD5 Signatures

Slackware 14.0 package: 3dc9af339945226035885f4896e7c443 httpd-2.4.51-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 621539c82e9f23a2b63ec4ad4fe60fa1 httpd-2.4.51-x86_64-1_slack14.0.txz
Slackware 14.1 package: b05881b3d8d5ce4edc267c1ab6f70be1 httpd-2.4.51-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 7be7108c6acbf118df01c06632242607 httpd-2.4.51-x86_64-1_slack14.1.txz
Slackware 14.2 package: d1d85a41387af3f18b777d000a023288 httpd-2.4.51-i586-1_slack14.2.txz
Slackware x86_64 14.2 package: 7909fd6353790b8cb3dd2d083ea7d6f3 httpd-2.4.51-x86_64-1_slack14.2.txz
Slackware -current package: 169e11d499afa90780a1d8d9c23a5a94 n/httpd-2.4.51-i586-1.txz
Slackware x86_64 -current package: c761e7d4fbc8198a21025b804a962874 n/httpd-2.4.51-x86_64-1.txz

Severity
[slackware-security] httpd (SSA:2021-280-01)
New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg httpd-2.4.51-i586-1_slack14.2.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start

Related News