#6723: httpd-2.4.16
-------------------------+-----------------------
 Reporter:  renodr       |       Owner:  bdubbs@…
     Type:  enhancement  |      Status:  closed
 Priority:  high         |   Milestone:  7.8
Component:  BOOK         |     Version:  SVN
 Severity:  normal       |  Resolution:  fixed
 Keywords:               |
-------------------------+-----------------------
Changes (by fo):

 * priority:  normal => high


Old description:

> Currency check says that there is a new version, but I am unable to find
> it right now.

New description:

 [https://archive.apache.org/dist/httpd/httpd-2.4.16.tar.bz2]

 [https://archive.apache.org/dist/httpd/httpd-2.4.16.tar.bz2.asc]

 [https://archive.apache.org/dist/httpd/httpd-2.4.16.tar.bz2.md5]

 2b19cd338fd526dd5a63c57b1e9bfee2

 [https://archive.apache.org/dist/httpd/CHANGES_2.4.16]

 {{{
 ...
 }}}

 [https://httpd.apache.org/security/vulnerabilities_24.html]

 {{{
 Fixed in Apache httpd 2.4.16

     low: mod_lua: Crash in websockets PING handling CVE-2015-0228

     A stack recursion crash in the mod_lua module was found. A Lua
     script executing the r:wsupgrade() function could crash the process
     if a malicious client sent a carefully crafted PING request. This
     issue affected releases 2.4.7 through 2.4.12 inclusive.

     Acknowledgements: This issue was reported by Guido Vranken.
     Reported to security team: 28th January 2015
     Issue public: 4th February 2015
     Update Released: 15th July 2015
     Affects: 2.4.12, 2.4.10, 2.4.9, 2.4.8, 2.4.7

     low: Crash in ErrorDocument 400 handling CVE-2015-0253

     A crash in ErrorDocument handling was found. If ErrorDocument 400
     was configured pointing to a local URL-path with the INCLUDES filter
     active, a NULL dereference would occur when handling the error,
     causing the child process to crash. This issue affected the 2.4.12
     release only.  Reported to security team: 3rd February 2015 Issue
     public: 5th March 2015 Update Released: 15th July 2015 Affects:
     2.4.12

     low: HTTP request smuggling attack against chunked request parser
     CVE-2015-3183

     An HTTP request smuggling attack was possible due to a bug in
     parsing of chunked requests. A malicious client could force the
     server to misinterpret the request length, allowing cache poisoning
     or credential hijacking if an intermediary proxy is in use.

     Acknowledgements: This issue was reported by Régis Leroy.
     Reported to security team: 4th April 2015
     Issue public: 9th June 2015
     Update Released: 15th July 2015
     Affects: 2.4.12, 2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3,
     2.4.2, 2.4.1

     low: ap_some_auth_required API unusable CVE-2015-3185

     A design error in the "ap_some_auth_required" function renders the
     API unusuable in httpd 2.4.x. In particular the API is documented to
     answering if the request required authentication but only answers if
     there are Require lines in the applicable configuration. Since 2.4.x
     Require lines are used for authorization as well and can appear in
     configurations even when no authentication is required and the
     request is entirely unrestricted. This could lead to modules using
     this API to allow access when they should otherwise not do so. API
     users should use the new ap_some_authn_required API added in 2.4.16
     instead.

     Acknowledgements: This issue was reported by Ben Reser.
     Reported to security team: 5th August 2013
     Issue public: 9th June 2015
     Update Released: 15th July 2015
     Affects: 2.4.12, 2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.5, 2.4.4,
     2.4.3, 2.4.2, 2.4.1, 2.4.0
 }}}

--

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/6723#comment:4>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to