Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:Update
patchinfo.3239
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.3239
<patchinfo incident="3239"> <issue id="1035829" tracker="bnc">gensslcert (apache2-utils) fails</issue> <issue id="980663" tracker="bnc">apache systemd notify related log message</issue> <issue id="1045062" tracker="bnc">VUL-0: CVE-2017-3169: apache2: in httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26 mod_sslmay have a dereference NULL pointer issue.</issue> <issue id="1045060" tracker="bnc">VUL-0: CVE-2017-7679: apache2: httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can buffer over-read</issue> <issue id="1048576" tracker="bnc">VUL-0: CVE-2017-9788: apache2: Uninitialized memory reflection in mod_auth_digest</issue> <issue id="1045065" tracker="bnc">VUL-0: CVE-2017-3167: apache2: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26 ap_get_basic_auth_pw() can lead to authentication requirements bypass</issue> <issue id="1041830" tracker="bnc">Upgrading the apache2 package alone does not check dependency resolution and removes symlink</issue> <issue id="1058058" tracker="bnc">VUL-0: EMBARGOED: CVE-2017-9798: apache2: information leak via OPTIONS</issue> <issue id="2017-9798" tracker="cve" /> <issue id="2017-9788" tracker="cve" /> <issue id="2017-3167" tracker="cve" /> <issue id="2017-7679" tracker="cve" /> <issue id="2017-3169" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>pgajdos</packager> <description>This update for apache2 fixes several issues. These security issues were fixed: - CVE-2017-9798: Prevent use-after-free use of memory that allowed for an information leak via OPTIONS (bsc#1058058) - CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest could have lead to leakage of potentially confidential information, and a segfault in other cases resulting in DoS (bsc#1048576). - CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type response header (bsc#1045060). - CVE-2017-3169: mod_ssl may dereferenced a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port allowing for DoS (bsc#1045062). - CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have lead to authentication requirements being bypassed (bsc#1045065). These non-security issues were fixed: - remove /usr/bin/http2 symlink only during apache2 package uninstall, not upgrade (bsc#1041830) - gensslcert: use hostname when fqdn is too long (bsc#1035829) - add NotifyAccess=all to service file (bsc#980663) </description> <summary>Security update for apache2</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor