#11576: httpd-2.4.38
-------------------------+---------------------
 Reporter:  renodr       |       Owner:  bdubbs
     Type:  enhancement  |      Status:  closed
 Priority:  high         |   Milestone:  8.4
Component:  BOOK         |     Version:  SVN
 Severity:  normal       |  Resolution:  fixed
 Keywords:               |
-------------------------+---------------------
Changes (by renodr):

 * priority:  normal => high


Comment:

 {{{


 CVE-2019-0190: mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1

 Severity: Important

 Vendor: The Apache Software Foundation

 Versions Affected:
 httpd 2.4.37

 Description:
 A bug exists in the way mod_ssl handled client renegotiations.
 A remote attacker could send a carefully crafted request that
 would cause mod_ssl to enter a loop leading to a denial of
 service.  This bug can be only triggered with Apache HTTP Server
 version 2.4.37 when using OpenSSL version 1.1.1 or later, due to
 an interaction in changes to handling of renegotiation attempts.

 Mitigation:
 All httpd users consuming mod_ssl combined with OpenSSL 1.1.1 or later
 should upgrade to 2.4.38 or later.

 Credit:
 The issue was identified through user bug reports.

 References:
 https://httpd.apache.org/security/vulnerabilities_24.html


 }}}

 {{{


 CVE-2018-17199: mod_session_cookie does not respect expiry time

 Severity: low

 Vendor: The Apache Software Foundation

 Versions Affected:
 httpd 2.4.0 to 2.4.37

 Description:
 In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session
 checks the session expiry time before decoding the session.
 This causes session expiry time to be ignored for
 mod_session_cookie sessions since the expiry time is loaded
 when the session is decoded.

 Mitigation:
 All httpd users deploying mod_session should upgrade to 2.4.38 or later.

 Credit:
 The issue was discovered by Diego Angulo from ImExHS.

 References:
 https://httpd.apache.org/security/vulnerabilities_24.html


 }}}

 {{{


 CVE-2018-17189: mod_http2, DoS via slow, unneeded request bodies

 Severity: Low

 Vendor: The Apache Software Foundation

 Versions Affected:
 httpd 2.4.17 to 2.4.37

 Description:
 By sending request bodies in a slow loris way to plain
 resources, the h2 stream for that request unnecessarily
 occupied a server thread cleaning up that incoming data.
 This affects only HTTP/2 (mod_http2) connections in
 Apache HTTP Server versions 2.4.37 and prior.

 Mitigation:
 All httpd users deploying mod_http2 should upgrade to 2.4.38 or later.

 Credit:
 The issue was discovered by Gal Goldshtein of F5 Networks.

 References:
 https://httpd.apache.org/security/vulnerabilities_24.html


 }}}

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/11576#comment:4>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to