[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1012553: bullseye-pu: package apache2/2.4.54-1~deb11u1



Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian.org@packages.debian.org
Usertags: pu
X-Debbugs-Cc: security@debian.org

[ Reason ]
Apache2 2.4.54 fixes several security issues:
 * moderate: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
   Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
   vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker
   to smuggle requests to the AJP server it forwards requests to.
 * low: read beyond bounds in mod_isapi (CVE-2022-28330)
 * low: read beyond bounds via ap_rwrite() (CVE-2022-28614)
 * low: Read beyond bounds in ap_strcmp_match() (CVE-2022-28615)
 * low: Denial of service in mod_lua r:parsebody (CVE-2022-29404)
 * low: mod_sed denial of service (CVE-2022-30522)
 * low: Information Disclosure in mod_lua with websockets (CVE-2022-30556)
 * low: mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)

[ Impact ]
Medium security issues

[ Tests ]
New test passed

[ Risks ]
Medium risk, Apache 2.4.54 only fixes issues. Apache 2.4.54 changelog
(as usual with Apache2 CVE references are added later in the changelog):

  *) mod_ssl: SSLFIPS compatible with OpenSSL 3.0.  PR 66063.
  *) mod_proxy_http: Avoid 417 responses for non forwardable 100-continue.
  *) mod_md:  a bug was fixed that caused very large MDomains
     with the combined DNS names exceeding ~7k to fail, as
     request bodies would contain partially wrong data from
     uninitialized memory. This would have appeared as failure
     in signing-up/renewing such configurations.
  *) mod_proxy_http: Avoid 417 responses for non forwardable 100-continue.
  *) MPM event: Restart children processes killed before idle maintenance.
  *) ab: Allow for TLSv1.3 when the SSL library supports it.
  *) core: Disable TCP_NOPUSH optimization on OSX since it might introduce
     transmission delays.
  *) MPM event: Fix accounting of active/total processes on ungraceful restart,
  *) core: make ap_escape_quotes() work correctly on strings
     with more than MAX_INT/2 characters, counting quotes double.
  *) mod_md: the `MDCertificateAuthority` directive can take more than one URL/name of
     an ACME CA. This gives a failover for renewals when several consecutive attempts
     to get a certificate failed.
     A new directive was added: `MDRetryDelay` sets the delay of retries.
     A new directive was added: `MDRetryFailover` sets the number of errored
     attempts before an alternate CA is selected for certificate renewals.
  *) mod_http2: remove unused and insecure code. Fixes PR66037.
  *) mod_proxy: Add backend port to log messages to
     ease identification of involved service.
  *) mod_http2: removing unscheduling of ongoing tasks when
     connection shows potential abuse by a client. This proved
     counter-productive and the abuse detection can false flag
     requests using server-side-events.
     Fixes <https://github.com/icing/mod_h2/issues/231>.
  *) mod_md: Implement full auto status ("key: value" type status output).
     Especially not only status summary counts for certificates and
     OCSP stapling but also lists. Auto status format is similar to
     what was used for mod_proxy_balancer.
  *) mod_md: fixed a bug leading to failed transfers for OCSP
     stapling information when more than 6 certificates needed
     updates in the same run.
  *) mod_proxy: Set a status code of 502 in case the backend just closed the
     connection in reply to our forwarded request.
  *) mod_md: a possible NULL pointer deref was fixed in
     the JSON code for persisting time periods (start+end).
     Fixes #282 on mod_md's github.
  *) mod_heartmonitor: Set the documented default value
     "10" for HeartbeatMaxServers instead of "0". With "0"
     no shared memory slotmem was initialized.
  *) mod_md: added support for managing certificates via a
     local tailscale daemon for users of that secure networking.
     This gives trusted certificates for tailscale assigned
     domain names in the *.ts.net space.

[ Checklist ]
  [*] *all* changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in (old)stable
  [*] the issue is verified as fixed in unstable

[ Changes ]

[ Other info ]
The whole change is available here: https://salsa.debian.org/apache-team/apache2/-/commit/6e38dd83
The debdiff only contains debian directory changes: new upstream + bad
filename in documentation.

Cheers,
Yadd
diff --git a/debian/apache2.README.Debian b/debian/apache2.README.Debian
index 325cc2a7..33fa6cbc 100644
--- a/debian/apache2.README.Debian
+++ b/debian/apache2.README.Debian
@@ -190,7 +190,7 @@ Using mod_cache_disk
 To ensure that the disk cache does not grow indefinitely, htcacheclean is
 started when mod_cache_disk is enabled. Both daemon and cron (daily) mode
 are supported. The configuration (run mode, cache size, etc.) is in
-'/etc/default/apache2'.
+'/etc/default/apache-htcacheclean'.
 
 Normally, htcacheclean is automatically started and stopped by
 '/etc/init.d/apache2'. However, if you change the state of mod_cache_disk or
diff --git a/debian/changelog b/debian/changelog
index eedee830..e654f005 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,15 @@
+apache2 (2.4.54-1~deb11u1) bullseye; urgency=medium
+
+  [ Yadd ]
+  * Fix htcacheclean doc (Closes: #1010455)
+
+  [ Yadd ]
+  * New upstream version 2.4.54 (closes: #1012513, CVE-2022-31813,
+    CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404,
+    CVE-2022-30522, CVE-2022-30556, CVE-2022-28330)
+
+ -- Yadd <yadd@debian.org>  Thu, 09 Jun 2022 06:26:43 +0200
+
 apache2 (2.4.53-1~deb11u1) bullseye; urgency=medium
 
   * New upstream version 2.4.53 (Closes: CVE-2022-22719,

Reply to: