Bug 29466 - apache new security issue CVE-2021-33193, CVE-2021-34798, CVE-2021-36160, CVE-2021-39275, CVE-2021-40438
Summary: apache new security issue CVE-2021-33193, CVE-2021-34798, CVE-2021-36160, CVE...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-09-16 21:50 CEST by David Walser
Modified: 2021-09-23 06:52 CEST (History)
4 users (show)

See Also:
Source RPM: apache-2.4.48-1.mga8.src.rpm
CVE: CVE-2021-33193, CVE-2021-34798, CVE-2021-36160, CVE-2021-39275, CVE-2021-40438
Status comment:


Attachments

Description David Walser 2021-09-16 21:50:20 CEST
Apache has announced version 2.4.49 today (September 16)
https://downloads.apache.org/httpd/Announcement2.4.html

It fixes several security issues:
https://downloads.apache.org/httpd/CHANGES_2.4.49
https://httpd.apache.org/security/vulnerabilities_24.html

Mageia 8 is also affected.
David Walser 2021-09-16 21:50:43 CEST

Status comment: (none) => Fixed upstream in 2.4.49
Whiteboard: (none) => MGA8TOO

Comment 1 Marja Van Waes 2021-09-16 22:06:20 CEST
Assigning to all packagers collectively, since there is no registered maintainer for this package.

Assignee: bugsquad => pkg-bugs
CC: (none) => marja11

Comment 2 Nicolas Salguero 2021-09-20 13:35:16 CEST
Suggested advisory:
========================

The updated packages fix security vulnerabilities:

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. (CVE-2021-33193)

Malformed requests may cause the server to dereference a NULL pointer. (CVE-2021-34798)

A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). (CVE-2021-36160)

ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. (CVE-2021-39275)

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. (CVE-2021-40438)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
https://downloads.apache.org/httpd/Announcement2.4.html
https://downloads.apache.org/httpd/CHANGES_2.4.49
https://httpd.apache.org/security/vulnerabilities_24.html
========================

Updated packages in core/updates_testing:
========================
apache-mod_proxy-2.4.49-1.mga8
apache-devel-2.4.49-1.mga8
apache-mod_http2-2.4.49-1.mga8
apache-mod_dav-2.4.49-1.mga8
apache-mod_ssl-2.4.49-1.mga8
apache-mod_cache-2.4.49-1.mga8
apache-mod_session-2.4.49-1.mga8
apache-mod_ldap-2.4.49-1.mga8
apache-mod_proxy_html-2.4.49-1.mga8
apache-mod_dbd-2.4.49-1.mga8
apache-mod_suexec-2.4.49-1.mga8
apache-htcacheclean-2.4.49-1.mga8
apache-mod_brotli-2.4.49-1.mga8
apache-mod_userdir-2.4.49-1.mga8
apache-2.4.49-1.mga8
apache-doc-2.4.49-1.mga8

from SRPM:
apache-2.4.49-1.mga8.src.rpm

Status: NEW => ASSIGNED
Assignee: pkg-bugs => qa-bugs
Status comment: Fixed upstream in 2.4.49 => (none)
CVE: (none) => CVE-2021-33193, CVE-2021-34798, CVE-2021-36160, CVE-2021-39275, CVE-2021-40438
Source RPM: apache-2.4.48-2.mga9.src.rpm => apache-2.4.48-1.mga8.src.rpm
Version: Cauldron => 8
CC: (none) => nicolas.salguero
Whiteboard: MGA8TOO => (none)

Comment 3 David Walser 2021-09-20 20:54:27 CEST
Fedora has issued an advisory for this today (September 20):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
Comment 4 Dave Hodgins 2021-09-23 00:50:06 CEST
Just testing that http:localhost and https://localhost work.
Advisory committed to svn.

Keywords: (none) => advisory, validated_update
Whiteboard: (none) => MGA8-64-OK
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 5 Mageia Robot 2021-09-23 06:52:40 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0439.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.