Slackware Security Advisories
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] httpd (SSA:2021-354-01)
Date: Mon, 20 Dec 2021 12:00:56 -0800 (PST)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  httpd (SSA:2021-354-01)

New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/httpd-2.4.52-i586-1_slack14.2.txz:  Upgraded.
  SECURITY: CVE-2021-44790: Possible buffer overflow when parsing
  multipart content in mod_lua of Apache HTTP Server 2.4.51 and
  earlier (cve.mitre.org)
  A carefully crafted request body can cause a buffer overflow in
  the mod_lua multipart parser (r:parsebody() called from Lua
  scripts).
  The Apache httpd team is not aware of an exploit for the
  vulnerabilty though it might be possible to craft one.
  This issue affects Apache HTTP Server 2.4.51 and earlier.
  Credits: Chamal
  SECURITY: CVE-2021-44224: Possible NULL dereference or SSRF in
  forward proxy configurations in Apache HTTP Server 2.4.51 and
  earlier (cve.mitre.org)
  A crafted URI sent to httpd configured as a forward proxy
  (ProxyRequests on) can cause a crash (NULL pointer dereference)
  or, for configurations mixing forward and reverse proxy
  declarations, can allow for requests to be directed to a
  declared Unix Domain Socket endpoint (Server Side Request
  Forgery).
  This issue affects Apache HTTP Server 2.4.7 up to 2.4.51
  (included).
  Credits: ae 1/4*a-o(R)e 1/4
  TengMA(@Te3t123)
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.52-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.52-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/httpd-2.4.52-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/httpd-2.4.52-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/httpd-2.4.52-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/httpd-2.4.52-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.52-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.52-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.0 package:
3f33dbe9e48f566aae45f8a56fcee09d  httpd-2.4.52-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
b71b016aee508a43f29d343d20cf91fe  httpd-2.4.52-x86_64-1_slack14.0.txz

Slackware 14.1 package:
9aee656af113bfdf6b3285e274802126  httpd-2.4.52-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
2d2de365767b26d8e74304aba13b0057  httpd-2.4.52-x86_64-1_slack14.1.txz

Slackware 14.2 package:
9a3a20287d0395057da257f96cc3087b  httpd-2.4.52-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
78e4e8cff10fafa96a3e4a47930b960d  httpd-2.4.52-x86_64-1_slack14.2.txz

Slackware -current package:
0cf640a7486c728b3b9e98a273740340  n/httpd-2.4.52-i586-1.txz

Slackware x86_64 -current package:
d1aa0a02df15ce2d9408e0ae0d76c3bc  n/httpd-2.4.52-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg httpd-2.4.52-i586-1_slack14.2.txz

Then, restart Apache httpd:

# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAmHA3NMACgkQakRjwEAQIjNMBACfZ7jPRvXVitUcqnassLq8vY8s
BzsAniKpxpOvyRXYxYB41hxni9QfrtdD
=dz+Q
-----END PGP SIGNATURE-----

Slackware™ is a trademark of Patrick Volkerding.