Ubuntu 4113-2: Apache HTTP Server regression

    Date17 Sep 2019
    CategoryUbuntu
    1151
    Posted ByLinuxSecurity Advisories
    USN-4113-1 introduced a regression in Apache.
    ==========================================================================
    Ubuntu Security Notice USN-4113-2
    September 17, 2019
    
    apache2 regression
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 19.04
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    
    Summary:
    
    USN-4113-1 introduced a regression in Apache.
    
    Software Description:
    - apache2: Apache HTTP server
    
    Details:
    
    USN-4113-1 fixed vulnerabilities in the Apache HTTP server.
    Unfortunately, that update introduced a regression when proxying
    balancer manager connections in some configurations. This update
    fixes the problem.
    
    We apologize for the inconvenience.
    
    Original advisory details:
    
     Stefan Eissing discovered that the HTTP/2 implementation in Apache
     did not properly handle upgrade requests from HTTP/1.1 to HTTP/2 in
     some situations. A remote attacker could use this to cause a denial
     of service (daemon crash). This issue only affected Ubuntu 18.04 LTS
     and Ubuntu 19.04. (CVE-2019-0197)
    
     Craig Young discovered that a memory overwrite error existed in
     Apache when performing HTTP/2 very early pushes in some situations. A
     remote attacker could use this to cause a denial of service (daemon
     crash). This issue only affected Ubuntu 18.04 LTS and Ubuntu 19.04.
     (CVE-2019-10081)
    
     Craig Young discovered that a read-after-free error existed in the
     HTTP/2 implementation in Apache during connection shutdown. A remote
     attacker could use this to possibly cause a denial of service (daemon
     crash) or possibly expose sensitive information. This issue only
     affected Ubuntu 18.04 LTS and Ubuntu 19.04. (CVE-2019-10082)
    
     Matei Badanoiu discovered that the mod_proxy component of
     Apache did not properly filter URLs when reporting errors in some
     configurations. A remote attacker could possibly use this issue to
     conduct cross-site scripting (XSS) attacks. (CVE-2019-10092)
    
     Daniel McCarney discovered that mod_remoteip component of Apache
     contained a stack buffer overflow when parsing headers from a trusted
     intermediary proxy in some situations. A remote attacker controlling a
     trusted proxy could use this to cause a denial of service or possibly
     execute arbitrary code. This issue only affected Ubuntu 19.04.
     (CVE-2019-10097)
    
     Yukitsugu Sasaki discovered that the mod_rewrite component in Apache
     was vulnerable to open redirects in some situations. A remote attacker
     could use this to possibly expose sensitive information or bypass
     intended restrictions. (CVE-2019-10098)
    
     Jonathan Looney discovered that the HTTP/2 implementation in Apache did
     not properly limit the amount of buffering for client connections in
     some situations. A remote attacker could use this to cause a denial
     of service (unresponsive daemon). This issue only affected Ubuntu
     18.04 LTS and Ubuntu 19.04. (CVE-2019-9517)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 19.04:
      apache2                         2.4.38-2ubuntu2.3
      apache2-bin                     2.4.38-2ubuntu2.3
    
    Ubuntu 18.04 LTS:
      apache2                         2.4.29-1ubuntu4.11
      apache2-bin                     2.4.29-1ubuntu4.11
    
    Ubuntu 16.04 LTS:
      apache2                         2.4.18-2ubuntu3.13
      apache2-bin                     2.4.18-2ubuntu3.13
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      https://usn.ubuntu.com/4113-2
      https://usn.ubuntu.com/4113-1
      https://launchpad.net/bugs/1842701
    
    Package Information:
      https://launchpad.net/ubuntu/+source/apache2/2.4.38-2ubuntu2.3
      https://launchpad.net/ubuntu/+source/apache2/2.4.29-1ubuntu4.11
      https://launchpad.net/ubuntu/+source/apache2/2.4.18-2ubuntu3.13
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.