180 lines
14 KiB
XML
180 lines
14 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
|
|
<DocumentTitle xml:lang="en">An update for httpd is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2</DocumentTitle>
|
|
<DocumentType>Security Advisory</DocumentType>
|
|
<DocumentPublisher Type="Vendor">
|
|
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
|
|
<IssuingAuthority>openEuler security committee</IssuingAuthority>
|
|
</DocumentPublisher>
|
|
<DocumentTracking>
|
|
<Identification>
|
|
<ID>openEuler-SA-2021-1473</ID>
|
|
</Identification>
|
|
<Status>Final</Status>
|
|
<Version>1.0</Version>
|
|
<RevisionHistory>
|
|
<Revision>
|
|
<Number>1.0</Number>
|
|
<Date>2021-12-25</Date>
|
|
<Description>Initial</Description>
|
|
</Revision>
|
|
</RevisionHistory>
|
|
<InitialReleaseDate>2021-12-25</InitialReleaseDate>
|
|
<CurrentReleaseDate>2021-12-25</CurrentReleaseDate>
|
|
<Generator>
|
|
<Engine>openEuler SA Tool V1.0</Engine>
|
|
<Date>2021-12-25</Date>
|
|
</Generator>
|
|
</DocumentTracking>
|
|
<DocumentNotes>
|
|
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">httpd security update</Note>
|
|
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for httpd is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.</Note>
|
|
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en"> Apache HTTP Server.
|
|
|
|
Security Fix(es):
|
|
|
|
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).(CVE-2021-44224)
|
|
|
|
A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.(CVE-2021-44790)</Note>
|
|
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for httpd is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
|
|
|
|
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
|
|
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
|
|
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">httpd</Note>
|
|
</DocumentNotes>
|
|
<DocumentReferences>
|
|
<Reference Type="Self">
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1473</URL>
|
|
</Reference>
|
|
<Reference Type="openEuler CVE">
|
|
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-44224</URL>
|
|
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-44790</URL>
|
|
</Reference>
|
|
<Reference Type="Other">
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-44224</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-44790</URL>
|
|
</Reference>
|
|
</DocumentReferences>
|
|
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
|
|
<Branch Type="Product Name" Name="openEuler">
|
|
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
|
|
<FullProductName ProductID="openEuler-20.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">openEuler-20.03-LTS-SP2</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="aarch64">
|
|
<FullProductName ProductID="httpd-devel-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-devel-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_md-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_md-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-debugsource-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-debugsource-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_ssl-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_ssl-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_session-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_session-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-debuginfo-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-debuginfo-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_proxy_html-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_proxy_html-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_ldap-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_ldap-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-tools-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-tools-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-devel-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-devel-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-debugsource-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-debugsource-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-tools-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-tools-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_md-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_md-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_session-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_session-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_proxy_html-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_proxy_html-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-debuginfo-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-debuginfo-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_ssl-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_ssl-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_ldap-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_ldap-2.4.43-12.oe1.aarch64.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="noarch">
|
|
<FullProductName ProductID="httpd-filesystem-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-filesystem-2.4.43-12.oe1.noarch.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-help-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-help-2.4.43-12.oe1.noarch.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-help-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-help-2.4.43-12.oe1.noarch.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-filesystem-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-filesystem-2.4.43-12.oe1.noarch.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="src">
|
|
<FullProductName ProductID="httpd-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-2.4.43-12.oe1.src.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-2.4.43-12.oe1.src.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="x86_64">
|
|
<FullProductName ProductID="mod_session-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_session-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-debugsource-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-debugsource-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_ldap-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_ldap-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-debuginfo-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-debuginfo-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-tools-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-tools-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_md-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_md-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_proxy_html-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_proxy_html-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_ssl-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">mod_ssl-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-devel-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">httpd-devel-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-tools-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-tools-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_session-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_session-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_md-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_md-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_ldap-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_ldap-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-devel-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-devel-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-debugsource-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-debugsource-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_proxy_html-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_proxy_html-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="httpd-debuginfo-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">httpd-debuginfo-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="mod_ssl-2.4.43-12" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">mod_ssl-2.4.43-12.oe1.x86_64.rpm</FullProductName>
|
|
</Branch>
|
|
</ProductTree>
|
|
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-12-25</ReleaseDate>
|
|
<CVE>CVE-2021-44224</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
<ProductID>openEuler-20.03-LTS-SP2</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>8.2</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>httpd security update</Description>
|
|
<DATE>2021-12-25</DATE>
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1473</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-12-25</ReleaseDate>
|
|
<CVE>CVE-2021-44790</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
<ProductID>openEuler-20.03-LTS-SP2</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Critical</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>9.8</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>httpd security update</Description>
|
|
<DATE>2021-12-25</DATE>
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1473</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
</cvrfdoc> |