[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: CVE-2016-5387/apache2



Hi Salvatore,
On Wed, Jul 20, 2016 at 09:30:16AM +0200, Salvatore Bonaccorso wrote:
> Hi LTS team,
> 
> I have prepared an update for the mitigation of "httpoxy" in apache2
> (CVE-2016-5387).
> 
> Unless someone of the team want's to actually do the upload I could do
> it, since already prepared. But just let me know.
> 
> Regards,
> Salvatore

> diff -Nru apache2-2.2.22/debian/changelog apache2-2.2.22/debian/changelog
> --- apache2-2.2.22/debian/changelog	2015-08-18 11:41:11.000000000 +0200
> +++ apache2-2.2.22/debian/changelog	2016-07-20 07:04:30.000000000 +0200
> @@ -1,3 +1,12 @@
> +apache2 (2.2.22-13+deb7u7) wheezy-security; urgency=high
> +
> +  * Non-maintainer upload.
> +  * CVE-2016-5387: Sets environmental variable based on user supplied Proxy
> +    request header.
> +    Don't pass through HTTP_PROXY in server/util_script.c
> +
> + -- Salvatore Bonaccorso <carnil@debian.org>  Wed, 20 Jul 2016 07:03:46 +0200
> +
>  apache2 (2.2.22-13+deb7u6) wheezy-security; urgency=medium
>  
>    * Fix regression causing spurious errors when loading certificate chain.
> diff -Nru apache2-2.2.22/debian/patches/CVE-2016-5387.patch apache2-2.2.22/debian/patches/CVE-2016-5387.patch
> --- apache2-2.2.22/debian/patches/CVE-2016-5387.patch	1970-01-01 01:00:00.000000000 +0100
> +++ apache2-2.2.22/debian/patches/CVE-2016-5387.patch	2016-07-20 07:04:30.000000000 +0200
> @@ -0,0 +1,17 @@
> +--- a/server/util_script.c
> ++++ b/server/util_script.c
> +@@ -180,6 +180,14 @@ AP_DECLARE(void) ap_add_common_vars(requ
> +         else if (!strcasecmp(hdrs[i].key, "Content-length")) {
> +             apr_table_addn(e, "CONTENT_LENGTH", hdrs[i].val);
> +         }
> ++        /* HTTP_PROXY collides with a popular envvar used to configure
> ++         * proxies, don't let clients set/override it.  But, if you must...
> ++         */
> ++#ifndef SECURITY_HOLE_PASS_PROXY
> ++        else if (!strcasecmp(hdrs[i].key, "Proxy")) {
> ++            ;
> ++        }
> ++#endif
> +         /*
> +          * You really don't want to disable this check, since it leaves you
> +          * wide open to CGIs stealing passwords and people viewing them
> diff -Nru apache2-2.2.22/debian/patches/series apache2-2.2.22/debian/patches/series
> --- apache2-2.2.22/debian/patches/series	2015-08-18 09:47:23.000000000 +0200
> +++ apache2-2.2.22/debian/patches/series	2016-07-20 07:04:30.000000000 +0200
> @@ -51,3 +51,4 @@
>  DH-SSLCertificateFile.patch
>  CVE-2015-3183.patch
>  SSL_CTX_use_certificate_clear_errors.diff
> +CVE-2016-5387.patch

Looks good to me. Thanks a lot for handling this!
 -- Guido


Reply to: