[USN-5487-3] Apache HTTP Server regression

Leonidas S. Barbosa leo.barbosa at canonical.com
Thu Jun 23 22:33:07 UTC 2022


==========================================================================
Ubuntu Security Notice USN-5487-3
June 23, 2022

apache2 regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

USN-5487-1 introduced a regression in Apache HTTP Server.

Software Description:
- apache2: Apache HTTP server

Details:

USN-5487-1 fixed several vulnerabilities in Apache HTTP Server.
Unfortunately it caused regressions. USN-5487-2 reverted the
patches that caused the regression in Ubuntu 14.04 ESM for further
investigation. This update re-adds the security fixes for Ubuntu
14.04 ESM and fixes two different regressions: one affecting mod_proxy
only in Ubuntu 14.04 ESM and another in mod_sed affecting also Ubuntu 16.04 ESM
and Ubuntu 18.04 LTS.

We apologize for the inconvenience.

Original advisory details:

 It was discovered that Apache HTTP Server mod_proxy_ajp incorrectly handled
 certain crafted request. A remote attacker could possibly use this issue to
 perform an HTTP Request Smuggling attack. (CVE-2022-26377)
 
 It was discovered that Apache HTTP Server incorrectly handled certain
 request. An attacker could possibly use this issue to cause a denial
 of service. (CVE-2022-28614)
 
 It was discovered that Apache HTTP Server incorrectly handled certain request.
 An attacker could possibly use this issue to cause a crash or expose
 sensitive information. (CVE-2022-28615)
 
 It was discovered that Apache HTTP Server incorrectly handled certain request.
 An attacker could possibly use this issue to cause a denial of service.
 (CVE-2022-29404)
 
 It was discovered that Apache HTTP Server incorrectly handled certain
 request. An attacker could possibly use this issue to cause a crash.
 (CVE-2022-30522)
 
 It was discovered that Apache HTTP Server incorrectly handled certain request.
 An attacker could possibly use this issue to execute arbitrary code or cause
 a crash. (CVE-2022-30556)
 
 It was discovered that Apache HTTP Server incorrectly handled certain request.
 An attacker could possibly use this issue to bypass IP based authentication.
 (CVE-2022-31813)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  apache2                         2.4.29-1ubuntu4.25
  apache2-bin                     2.4.29-1ubuntu4.25

Ubuntu 16.04 ESM:
  apache2                         2.4.18-2ubuntu3.17+esm7
  apache2-bin                     2.4.18-2ubuntu3.17+esm7

Ubuntu 14.04 ESM:
  apache2                         2.4.7-1ubuntu4.22+esm8
  apache2-bin                     2.4.7-1ubuntu4.22+esm8

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5487-3
  https://ubuntu.com/security/notices/USN-5487-1
  CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404,
  CVE-2022-30522, CVE-2022-30556, CVE-2022-31813, https://launchpad.net/bugs/1979577,
  https://launchpad.net/bugs/1979641

Package Information:
  https://launchpad.net/ubuntu/+source/apache2/2.4.29-1ubuntu4.25
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20220623/87aba436/attachment.sig>


More information about the ubuntu-security-announce mailing list