#18745 closed enhancement (fixed)
httpd-2.4.58
Reported by: | Bruce Dubbs | Owned by: | |
---|---|---|---|
Priority: | elevated | Milestone: | 12.1 |
Component: | BOOK | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description
New point version.
Change History (10)
comment:1 by , 16 months ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:2 by , 16 months ago
comment:3 by , 16 months ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Fixed at commits
1c8e374e73 Update to httpd-2.4.58. 261bdae708 Update to gnome-terminal-3.50.1 and vte-0.74.1
comment:4 by , 16 months ago
Resolution: | fixed |
---|---|
Status: | closed → reopened |
CVEs listed at https://httpd.apache.org/security/vulnerabilities_24.html
low: mod_macro buffer over-read (CVE-2023-31122)
Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
Acknowledgements: finder: David Shoon (github/davidshoon) Update 2.4.58 released 2023-10-19 Affects <=2.4.57
low: Apache HTTP Server: DoS in HTTP/2 with initial windows size 0 (CVE-2023-43622)
An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern.
This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.
This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.
Users are recommended to upgrade to version 2.4.58, which fixes the issue.
Acknowledgements:
finder: Prof. Sven Dietrich (City University of New York) finder: Isa Jafarov (City University of New York) finder: Prof. Heejo Lee (Korea University) finder: Choongin Lee (Korea University)
Reported to security team 2023-09-15 Update 2.4.58 released 2023-10-19 Affects <=2.4.57
moderate: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST (CVE-2023-45802)
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.
This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.
Users are recommended to upgrade to version 2.4.58, which fixes the issue.
Acknowledgements:
finder: Will Dormann of Vul Labs finder: David Warren of Vul Labs
Reported to security team 2023-10-12 Update 2.4.58 released 2023-10-19 Affects <=2.4.57
Reopening to create security advisory.
comment:5 by , 16 months ago
Owner: | changed from | to
---|---|
Status: | reopened → new |
comment:6 by , 16 months ago
Security Advisory SA 12.0 027 created. Something breaks the html validation in consolidated.html, for the moment I cannot see where.
comment:7 by , 16 months ago
Resolution: | → fixed |
---|---|
Status: | new → closed |
Error was in an older advisory.
comment:9 by , 16 months ago
Priority: | normal → elevated |
---|
Changes with Apache 2.4.58
X-Forward-Host
header to carry the correct value.H2ProxyRequests on|off
to enable handling of HTTP/2 requests in a forward proxy configuration. General forward proxying is enabled viaProxyRequests
. If the HTTP/2 protocol is also enabled for such a server/host, this new directive is needed in addition.Total Accesses
in server-status to not count HTTP/2 requests twice.MDMatchNames all|servernames
to allow more control over how MDomains are matched to VirtualHosts.MDChallengeDns01Version
. Setting this to2
will provide the command also with the challenge value onteardown
invocation. In version 1, the default, only thesetup
invocation gets this parameter. Refs #312. Thanks to @domrim for the idea.