[USN-5487-3] Apache HTTP Server regression
Leonidas S. Barbosa
leo.barbosa at canonical.com
Thu Jun 23 22:33:07 UTC 2022
==========================================================================
Ubuntu Security Notice USN-5487-3
June 23, 2022
apache2 regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
USN-5487-1 introduced a regression in Apache HTTP Server.
Software Description:
- apache2: Apache HTTP server
Details:
USN-5487-1 fixed several vulnerabilities in Apache HTTP Server.
Unfortunately it caused regressions. USN-5487-2 reverted the
patches that caused the regression in Ubuntu 14.04 ESM for further
investigation. This update re-adds the security fixes for Ubuntu
14.04 ESM and fixes two different regressions: one affecting mod_proxy
only in Ubuntu 14.04 ESM and another in mod_sed affecting also Ubuntu 16.04 ESM
and Ubuntu 18.04 LTS.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Apache HTTP Server mod_proxy_ajp incorrectly handled
certain crafted request. A remote attacker could possibly use this issue to
perform an HTTP Request Smuggling attack. (CVE-2022-26377)
It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a denial
of service. (CVE-2022-28614)
It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a crash or expose
sensitive information. (CVE-2022-28615)
It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-29404)
It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a crash.
(CVE-2022-30522)
It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to execute arbitrary code or cause
a crash. (CVE-2022-30556)
It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to bypass IP based authentication.
(CVE-2022-31813)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
apache2 2.4.29-1ubuntu4.25
apache2-bin 2.4.29-1ubuntu4.25
Ubuntu 16.04 ESM:
apache2 2.4.18-2ubuntu3.17+esm7
apache2-bin 2.4.18-2ubuntu3.17+esm7
Ubuntu 14.04 ESM:
apache2 2.4.7-1ubuntu4.22+esm8
apache2-bin 2.4.7-1ubuntu4.22+esm8
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5487-3
https://ubuntu.com/security/notices/USN-5487-1
CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404,
CVE-2022-30522, CVE-2022-30556, CVE-2022-31813, https://launchpad.net/bugs/1979577,
https://launchpad.net/bugs/1979641
Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.29-1ubuntu4.25
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20220623/87aba436/attachment.sig>
More information about the ubuntu-security-announce
mailing list