Message ID | 20240718151255.3435592-1-matthias.fischer@ipfire.org |
---|---|
State | Staged |
Commit | e001c59719b250a16f65d2f98fd625e6ade18287 |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4WPxBq1Zv6z3x1w for <patchwork@web04.haj.ipfire.org>; Thu, 18 Jul 2024 15:13:07 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "E5" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4WPxBm6Zv9z1K2; Thu, 18 Jul 2024 15:13:04 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4WPxBm5HkSz33KX; Thu, 18 Jul 2024 15:13:04 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4WPxBk6z3Tz33KX for <development@lists.ipfire.org>; Thu, 18 Jul 2024 15:13:02 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4WPxBk0h4cz1K2 for <development@lists.ipfire.org>; Thu, 18 Jul 2024 15:13:02 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1721315582; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=oOwN0aEhevQeVRKCjdwmeBrHeZ8jbF5wl5QSFgdDtlg=; b=YFfZl2DPeQVH5CzgpoFAhx2xiYJ+jNmaN3bi7vkQcW66eFrL8ScfzsSLbWZlM988Us8TM1 JgssO9f+XweVakAA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1721315582; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=oOwN0aEhevQeVRKCjdwmeBrHeZ8jbF5wl5QSFgdDtlg=; b=jiNiiqVhze/I6v+DJIXgtDljaVn634xh76GU1eycIGlUceBXaYwjfEYzx0T0//o27DaOtl FC7c1yJuvECsNvvEEMGoZqM7hMAXHzywDj/sSfXoNDrT3QgJK76XyNc64NsNOxRkSW41L/ lWIOhmufnFFeCk9sXlf/lYxW/4q1oSpe44bFK3w29hF64NaIOytV00LllMSNE24Zlyjesn sEjV8y1zRbQV5F6EEfNYcIzYCtNHn2JXJt+6jraBLeHXpJKbO2ZHdMeNJP+xRofQEYHUBY yUHcIh9GJGFHhY8Y3X6IIeZSJsIKUlK2Hddg2MAgoCAYH0akvDOBPQCxnM778w== From: Matthias Fischer <matthias.fischer@ipfire.org> To: development@lists.ipfire.org Subject: [PATCH] apache: Update to 2.4.62 Date: Thu, 18 Jul 2024 17:12:55 +0200 Message-Id: <20240718151255.3435592-1-matthias.fischer@ipfire.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Message-ID-Hash: Y5FHTYPJJQKA67UKXSBOAPALP44BURPA X-Message-ID-Hash: Y5FHTYPJJQKA67UKXSBOAPALP44BURPA X-MailFrom: matthias.fischer@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> Archived-At: <https://lists.ipfire.org/hyperkitty/list/development@lists.ipfire.org/message/Y5FHTYPJJQKA67UKXSBOAPALP44BURPA/> List-Archive: <https://lists.ipfire.org/hyperkitty/list/development@lists.ipfire.org/> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Owner: <mailto:development-owner@lists.ipfire.org> List-Post: <mailto:development@lists.ipfire.org> List-Subscribe: <mailto:development-join@lists.ipfire.org> List-Unsubscribe: <mailto:development-leave@lists.ipfire.org> |
Series |
apache: Update to 2.4.62
|
|
Commit Message
Matthias Fischer
July 18, 2024, 3:12 p.m. UTC
"All good things go by three..."
For details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.62
"Changes with Apache 2.4.62
*) SECURITY: CVE-2024-40898: Apache HTTP Server: SSRF with
mod_rewrite in server/vhost context on Windows (cve.mitre.org)
SSRF in Apache HTTP Server on Windows with mod_rewrite in
server/vhost context, allows to potentially leak NTML hashes to
a malicious server via SSRF and malicious requests.
Users are recommended to upgrade to version 2.4.62 which fixes
this issue.
Credits: Smi1e (DBAPPSecurity Ltd.)
*) SECURITY: CVE-2024-40725: Apache HTTP Server: source code
disclosure with handlers configured via AddType (cve.mitre.org)
A partial fix for CVE-2024-39884 in the core of Apache HTTP
Server 2.4.61 ignores some use of the legacy content-type based
configuration of handlers. "AddType" and similar configuration,
under some circumstances where files are requested indirectly,
result in source code disclosure of local content. For example,
PHP scripts may be served instead of interpreted.
Users are recommended to upgrade to version 2.4.62, which fixes
this issue.
*) mod_proxy: Fix canonicalisation and FCGI env (PATH_INFO, SCRIPT_NAME) for
"balancer:" URLs set via SetHandler, also allowing for "unix:" sockets
with BalancerMember(s). PR 69168. [Yann Ylavic]
*) mod_proxy: Avoid AH01059 parsing error for SetHandler "unix:" URLs.
PR 69160 [Yann Ylavic]
*) mod_ssl: Fix crashes in PKCS#11 ENGINE support with OpenSSL 3.2.
[Joe Orton]
*) mod_ssl: Add support for loading certs/keys from pkcs11: URIs
via OpenSSL 3.x providers. [Ingo Franzki <ifranzki linux.ibm.com>]
*) mod_ssl: Restore SSL dumping on trace7 loglevel with OpenSSL >= 3.0.
[Ruediger Pluem, Yann Ylavic]
*) mpm_worker: Fix possible warning (AH00045) about children processes not
terminating timely. [Yann Ylavic]"
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
---
lfs/apache2 | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Comments
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org> On 18/07/2024 17:12, Matthias Fischer wrote: > "All good things go by three..." > > For details see: > https://dlcdn.apache.org/httpd/CHANGES_2.4.62 > > "Changes with Apache 2.4.62 > > *) SECURITY: CVE-2024-40898: Apache HTTP Server: SSRF with > mod_rewrite in server/vhost context on Windows (cve.mitre.org) > SSRF in Apache HTTP Server on Windows with mod_rewrite in > server/vhost context, allows to potentially leak NTML hashes to > a malicious server via SSRF and malicious requests. > Users are recommended to upgrade to version 2.4.62 which fixes > this issue. > Credits: Smi1e (DBAPPSecurity Ltd.) > > *) SECURITY: CVE-2024-40725: Apache HTTP Server: source code > disclosure with handlers configured via AddType (cve.mitre.org) > A partial fix for CVE-2024-39884 in the core of Apache HTTP > Server 2.4.61 ignores some use of the legacy content-type based > configuration of handlers. "AddType" and similar configuration, > under some circumstances where files are requested indirectly, > result in source code disclosure of local content. For example, > PHP scripts may be served instead of interpreted. > Users are recommended to upgrade to version 2.4.62, which fixes > this issue. > > *) mod_proxy: Fix canonicalisation and FCGI env (PATH_INFO, SCRIPT_NAME) for > "balancer:" URLs set via SetHandler, also allowing for "unix:" sockets > with BalancerMember(s). PR 69168. [Yann Ylavic] > > *) mod_proxy: Avoid AH01059 parsing error for SetHandler "unix:" URLs. > PR 69160 [Yann Ylavic] > > *) mod_ssl: Fix crashes in PKCS#11 ENGINE support with OpenSSL 3.2. > [Joe Orton] > > *) mod_ssl: Add support for loading certs/keys from pkcs11: URIs > via OpenSSL 3.x providers. [Ingo Franzki <ifranzki linux.ibm.com>] > > *) mod_ssl: Restore SSL dumping on trace7 loglevel with OpenSSL >= 3.0. > [Ruediger Pluem, Yann Ylavic] > > *) mpm_worker: Fix possible warning (AH00045) about children processes not > terminating timely. [Yann Ylavic]" > > Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org> > --- > lfs/apache2 | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/lfs/apache2 b/lfs/apache2 > index 2dfd8b39d..428ef3419 100644 > --- a/lfs/apache2 > +++ b/lfs/apache2 > @@ -25,7 +25,7 @@ > > include Config > > -VER = 2.4.61 > +VER = 2.4.62 > > THISAPP = httpd-$(VER) > DL_FILE = $(THISAPP).tar.bz2 > @@ -45,7 +45,7 @@ objects = $(DL_FILE) > > $(DL_FILE) = $(DL_FROM)/$(DL_FILE) > > -$(DL_FILE)_BLAKE2 = 9299ef5843888829143732b3a60d1713aff688ed2f6c2b7f154be16bc075ec747a5b116716f188491ebc9947ff2dfe09dfc71f5245d98a4be3ba27ada28ec8a5 > +$(DL_FILE)_BLAKE2 = 0e5c3b05819771e6ff72933ad715695199a32c384f63de6598e179ff5803580f04639437829305150305c9a2b7d309178552d8c9a2d7248a034c98f445193b95 > > install : $(TARGET) >
diff --git a/lfs/apache2 b/lfs/apache2 index 2dfd8b39d..428ef3419 100644 --- a/lfs/apache2 +++ b/lfs/apache2 @@ -25,7 +25,7 @@ include Config -VER = 2.4.61 +VER = 2.4.62 THISAPP = httpd-$(VER) DL_FILE = $(THISAPP).tar.bz2 @@ -45,7 +45,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 9299ef5843888829143732b3a60d1713aff688ed2f6c2b7f154be16bc075ec747a5b116716f188491ebc9947ff2dfe09dfc71f5245d98a4be3ba27ada28ec8a5 +$(DL_FILE)_BLAKE2 = 0e5c3b05819771e6ff72933ad715695199a32c384f63de6598e179ff5803580f04639437829305150305c9a2b7d309178552d8c9a2d7248a034c98f445193b95 install : $(TARGET)