diff mbox

apache: security bump to version 2.4.26

Message ID 20170620211345.18677-1-peter@korsgaard.com
State Accepted
Headers show

Commit Message

Peter Korsgaard June 20, 2017, 9:13 p.m. UTC
Fixes the following security issues:

CVE-2017-3167: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26,
use of the ap_get_basic_auth_pw() by third-party modules outside of the
authentication phase may lead to authentication requirements being bypassed.

CVE-2017-3169: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26,
mod_ssl may dereference a NULL pointer when third-party modules call
ap_hook_process_connection() during an HTTP request to an HTTPS port.

CVE-2017-7659: A maliciously constructed HTTP/2 request could cause
mod_http2 to dereference a NULL pointer and crash the server process.

CVE-2017-7668: The HTTP strict parsing changes added in Apache httpd 2.2.32
and 2.4.24 introduced a bug in token list parsing, which allows
ap_find_token() to search past the end of its input string.  By maliciously
crafting a sequence of request headers, an attacker may be able to cause a
segmentation fault, or to force ap_find_token() to return an incorrect
value.

CVE-2017-7679: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26,
mod_mime can read one byte past the end of a buffer when sending a malicious
Content-Type response header.

While we're at it, use the upstream sha256 checksum instead of sha1.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
 package/apache/apache.hash | 4 ++--
 package/apache/apache.mk   | 2 +-
 2 files changed, 3 insertions(+), 3 deletions(-)

Comments

Thomas Petazzoni June 20, 2017, 9:30 p.m. UTC | #1
Hello,

On Tue, 20 Jun 2017 23:13:45 +0200, Peter Korsgaard wrote:
> Fixes the following security issues:
> 
> CVE-2017-3167: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26,
> use of the ap_get_basic_auth_pw() by third-party modules outside of the
> authentication phase may lead to authentication requirements being bypassed.
> 
> CVE-2017-3169: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26,
> mod_ssl may dereference a NULL pointer when third-party modules call
> ap_hook_process_connection() during an HTTP request to an HTTPS port.
> 
> CVE-2017-7659: A maliciously constructed HTTP/2 request could cause
> mod_http2 to dereference a NULL pointer and crash the server process.
> 
> CVE-2017-7668: The HTTP strict parsing changes added in Apache httpd 2.2.32
> and 2.4.24 introduced a bug in token list parsing, which allows
> ap_find_token() to search past the end of its input string.  By maliciously
> crafting a sequence of request headers, an attacker may be able to cause a
> segmentation fault, or to force ap_find_token() to return an incorrect
> value.
> 
> CVE-2017-7679: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26,
> mod_mime can read one byte past the end of a buffer when sending a malicious
> Content-Type response header.
> 
> While we're at it, use the upstream sha256 checksum instead of sha1.
> 
> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
> ---
>  package/apache/apache.hash | 4 ++--
>  package/apache/apache.mk   | 2 +-
>  2 files changed, 3 insertions(+), 3 deletions(-)

Applied to master, thanks.

Thomas
Peter Korsgaard June 26, 2017, 7:59 a.m. UTC | #2
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes the following security issues:
 > CVE-2017-3167: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26,
 > use of the ap_get_basic_auth_pw() by third-party modules outside of the
 > authentication phase may lead to authentication requirements being bypassed.

 > CVE-2017-3169: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26,
 > mod_ssl may dereference a NULL pointer when third-party modules call
 > ap_hook_process_connection() during an HTTP request to an HTTPS port.

 > CVE-2017-7659: A maliciously constructed HTTP/2 request could cause
 > mod_http2 to dereference a NULL pointer and crash the server process.

 > CVE-2017-7668: The HTTP strict parsing changes added in Apache httpd 2.2.32
 > and 2.4.24 introduced a bug in token list parsing, which allows
 > ap_find_token() to search past the end of its input string.  By maliciously
 > crafting a sequence of request headers, an attacker may be able to cause a
 > segmentation fault, or to force ap_find_token() to return an incorrect
 > value.

 > CVE-2017-7679: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26,
 > mod_mime can read one byte past the end of a buffer when sending a malicious
 > Content-Type response header.

 > While we're at it, use the upstream sha256 checksum instead of sha1.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2017.02.x and 2017.05.x, thanks.
diff mbox

Patch

diff --git a/package/apache/apache.hash b/package/apache/apache.hash
index 38fd883f82..fe7174a4d2 100644
--- a/package/apache/apache.hash
+++ b/package/apache/apache.hash
@@ -1,2 +1,2 @@ 
-# From http://www.apache.org/dist/httpd/httpd-2.4.23.tar.bz2.sha1
-sha1 bd6d138c31c109297da2346c6e7b93b9283993d2  httpd-2.4.25.tar.bz2
+# From http://www.apache.org/dist/httpd/httpd-2.4.26.tar.bz2.sha256
+sha256 a07eb52fafc879e0149d31882f7da63173e72df4478db4dc69f7a775b663d387 httpd-2.4.26.tar.bz2
diff --git a/package/apache/apache.mk b/package/apache/apache.mk
index ae629bd2ca..b276b8d493 100644
--- a/package/apache/apache.mk
+++ b/package/apache/apache.mk
@@ -4,7 +4,7 @@ 
 #
 ################################################################################
 
-APACHE_VERSION = 2.4.25
+APACHE_VERSION = 2.4.26
 APACHE_SOURCE = httpd-$(APACHE_VERSION).tar.bz2
 APACHE_SITE = http://archive.apache.org/dist/httpd
 APACHE_LICENSE = Apache-2.0