Bug 57554 - apache2: Multiple issues (5.0)
apache2: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-8-errata
Assigned To: Quality Assurance
Julia Bremer
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2024-09-02 09:24 CEST by Quality Assurance
Modified: 2024-09-04 17:51 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2024-09-02 09:24:06 CEST
New Debian apache2 2.4.59-1~deb10u2A~5.0.8.202409020923 fixes:
This update addresses the following issues:
2.4.59-1~deb10u2 (Tue, 20 Aug 2024 23:40:12 +0000)
* Team upload by ELTS Team
[ Bastien Roucariès ]
* Unfuzz patches
* Add new autopkgtest suite from santiago
* Fix CVE-2024-36387: Serving WebSocket protocol upgrades over a HTTP/2  connection could result in a NULL Pointer dereference
* Fix CVE-2024-38476: SSRF or local script execution via backend applications  whose response headers are malicious or exploitable
* Fix CVE-2024-38477: a NULL pointer dereference was found in mod_proxy  allowing an attacker to crash the server via a malicious request.
* Fix CVE-2024-38573: A potential SSRF in mod_rewrite allowed an attacker to  cause unsafe RewriteRules to unexpectedly setup URL's to be handled by  mod_proxy.
* Fix CVE-2024-39884: A regression of CVE-2024-38476 in the core of Apache  HTTP Server ignores some use of the legacy content-type based configuration  of handlers. "AddType" and similar configuration, under some circumstances  where files are requested indirectly, result in source code disclosure of  local content. For example, PHP scripts may be served instead of  interpreted.
* Fix CVE-2024-40725: A partial fix for CVE-2024-38476 in the core of Apache  HTTP Server ignores some use of the legacy content-type based configuration  of handlers. "AddType" and similar configuration, under some circumstances  where files are requested indirectly, result in source code disclosure of  local content. For example, PHP scripts may be served instead of  interpreted.
Comment 1 Quality Assurance univentionstaff 2024-09-02 10:00:28 CEST
--- mirror/ftp/pool/main/a/apache2/apache2_2.4.59-1~deb10u1A~5.0.8.202406031541.dsc
+++ apt/ucs_5.0-0-errata5.0-8/source/apache2_2.4.59-1~deb10u2A~5.0.8.202409020923.dsc
@@ -1,7 +1,39 @@
-2.4.59-1~deb10u1A~5.0.8.202406031541 [Mon, 03 Jun 2024 15:42:59 -0000] Univention builddaemon <buildd@univention.de>:
+2.4.59-1~deb10u2A~5.0.8.202409020923 [Mon, 02 Sep 2024 09:24:15 -0000] Univention builddaemon <buildd@univention.de>:
 
   * UCS auto build. The following patches have been applied to the original source package
     20-no-proxy.patch
+
+2.4.59-1~deb10u2 [Tue, 20 Aug 2024 23:40:12 +0000] Bastien Roucariès <rouca@debian.org>:
+
+  * Team upload by ELTS Team
+
+  [ Bastien Roucariès ]
+  * Unfuzz patches
+  * Add new autopkgtest suite from santiago
+  * Fix CVE-2024-36387: Serving WebSocket protocol upgrades over
+    a HTTP/2 connection could result in a NULL Pointer
+    dereference
+  * Fix CVE-2024-38476: SSRF or local script execution via
+    backend applications whose response headers are malicious
+    or exploitable
+  * Fix CVE-2024-38477: a NULL pointer dereference was found in
+    mod_proxy allowing an attacker to crash the server via
+    a malicious request.
+  * Fix CVE-2024-38573: A potential SSRF in mod_rewrite allowed an
+    attacker to cause unsafe RewriteRules to unexpectedly
+    setup URL's to be handled by mod_proxy.
+  * Fix CVE-2024-39884: A regression of CVE-2024-38476 in the core of Apache
+    HTTP Server ignores some use of the legacy content-type based
+    configuration of handlers. "AddType" and similar configuration,
+    under some circumstances where files are requested indirectly,
+    result in source code disclosure of local content. For example,
+    PHP scripts may be served instead of interpreted.
+  * Fix CVE-2024-40725: A partial fix for CVE-2024-38476 in the core of
+    Apache HTTP Server ignores some use of the legacy content-type based
+    configuration of handlers. "AddType" and similar configuration,
+    under some circumstances where files are requested indirectly,
+    result in source code disclosure of local content. For example,
+    PHP scripts may be served instead of interpreted.
 
 2.4.59-1~deb10u1 [Fri, 24 May 2024 22:36:21 +0000] Bastien Roucariès <rouca@debian.org>:
 

<http://piuparts.knut.univention.de/5.0-8/#624810830588650206>
Comment 2 Julia Bremer univentionstaff 2024-09-04 15:25:40 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: jenkins
OK: piuparts
Verified