Slackware: 2021-354-01: httpd Security Update | LinuxSecurity.com

Advisories


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  httpd (SSA:2021-354-01)

New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/httpd-2.4.52-i586-1_slack14.2.txz:  Upgraded.
  SECURITY: CVE-2021-44790: Possible buffer overflow when parsing
  multipart content in mod_lua of Apache HTTP Server 2.4.51 and
  earlier (cve.mitre.org)
  A carefully crafted request body can cause a buffer overflow in
  the mod_lua multipart parser (r:parsebody() called from Lua
  scripts).
  The Apache httpd team is not aware of an exploit for the
  vulnerabilty though it might be possible to craft one.
  This issue affects Apache HTTP Server 2.4.51 and earlier.
  Credits: Chamal
  SECURITY: CVE-2021-44224: Possible NULL dereference or SSRF in
  forward proxy configurations in Apache HTTP Server 2.4.51 and
  earlier (cve.mitre.org)
  A crafted URI sent to httpd configured as a forward proxy
  (ProxyRequests on) can cause a crash (NULL pointer dereference)
  or, for configurations mixing forward and reverse proxy
  declarations, can allow for requests to be directed to a
  declared Unix Domain Socket endpoint (Server Side Request
  Forgery).
  This issue affects Apache HTTP Server 2.4.7 up to 2.4.51
  (included).
  Credits: ae 1/4*a-o(R)e 1/4
  TengMA(@Te3t123)
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on https://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.52-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.52-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/httpd-2.4.52-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/httpd-2.4.52-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/httpd-2.4.52-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/httpd-2.4.52-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.52-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.52-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.0 package:
3f33dbe9e48f566aae45f8a56fcee09d  httpd-2.4.52-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
b71b016aee508a43f29d343d20cf91fe  httpd-2.4.52-x86_64-1_slack14.0.txz

Slackware 14.1 package:
9aee656af113bfdf6b3285e274802126  httpd-2.4.52-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
2d2de365767b26d8e74304aba13b0057  httpd-2.4.52-x86_64-1_slack14.1.txz

Slackware 14.2 package:
9a3a20287d0395057da257f96cc3087b  httpd-2.4.52-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
78e4e8cff10fafa96a3e4a47930b960d  httpd-2.4.52-x86_64-1_slack14.2.txz

Slackware -current package:
0cf640a7486c728b3b9e98a273740340  n/httpd-2.4.52-i586-1.txz

Slackware x86_64 -current package:
d1aa0a02df15ce2d9408e0ae0d76c3bc  n/httpd-2.4.52-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg httpd-2.4.52-i586-1_slack14.2.txz

Then, restart Apache httpd:

# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start


+-----+

Slackware: 2021-354-01: httpd Security Update

December 20, 2021
New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues

Summary

Here are the details from the Slackware 14.2 ChangeLog: patches/packages/httpd-2.4.52-i586-1_slack14.2.txz: Upgraded. SECURITY: CVE-2021-44790: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier (cve.mitre.org) A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. Credits: Chamal SECURITY: CVE-2021-44224: Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier (cve.mitre.org) A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). Credits: ae 1/4*a-o(R)e 1/4 TengMA(@Te3t123) For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224 (* Security fix *)

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on https://slackware.com for additional mirror sites near you.
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.52-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.52-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/httpd-2.4.52-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/httpd-2.4.52-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/httpd-2.4.52-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/httpd-2.4.52-x86_64-1_slack14.2.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.52-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.52-x86_64-1.txz

MD5 Signatures

Slackware 14.0 package: 3f33dbe9e48f566aae45f8a56fcee09d httpd-2.4.52-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: b71b016aee508a43f29d343d20cf91fe httpd-2.4.52-x86_64-1_slack14.0.txz
Slackware 14.1 package: 9aee656af113bfdf6b3285e274802126 httpd-2.4.52-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 2d2de365767b26d8e74304aba13b0057 httpd-2.4.52-x86_64-1_slack14.1.txz
Slackware 14.2 package: 9a3a20287d0395057da257f96cc3087b httpd-2.4.52-i586-1_slack14.2.txz
Slackware x86_64 14.2 package: 78e4e8cff10fafa96a3e4a47930b960d httpd-2.4.52-x86_64-1_slack14.2.txz
Slackware -current package: 0cf640a7486c728b3b9e98a273740340 n/httpd-2.4.52-i586-1.txz
Slackware x86_64 -current package: d1aa0a02df15ce2d9408e0ae0d76c3bc n/httpd-2.4.52-x86_64-1.txz

Severity
[slackware-security] httpd (SSA:2021-354-01)
New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg httpd-2.4.52-i586-1_slack14.2.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.