Issued:
2017-08-15
Updated:
2017-08-15

RHSA-2017:2479 - Important: httpd security update


Synopsis

Important: httpd security update

Type/Severity

Security Advisory Important

Topic

An update for httpd is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

  • It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)

  • It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)

  • A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)

  • A buffer over-read flaw was found in the httpd's ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)

  • A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon will be restarted automatically.

Affected Products

ProductVersionArch
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions7.7x86_64
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions7.6x86_64
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions7.4x86_64
Red Hat Enterprise Linux for x86_64 - Extended Update Support7.7x86_64
Red Hat Enterprise Linux for x86_64 - Extended Update Support7.6x86_64
Red Hat Enterprise Linux for x86_64 - Extended Update Support7.5x86_64
Red Hat Enterprise Linux for x86_64 - Extended Update Support7.4x86_64
Red Hat Enterprise Linux for Scientific Computing7x86_64
Red Hat Enterprise Linux for Power, little endian7ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support7.7ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support7.6ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support7.5ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support7.4ppc64le
Red Hat Enterprise Linux for Power, big endian7ppc64
Red Hat Enterprise Linux for Power, big endian - Extended Update Support7.7ppc64
Red Hat Enterprise Linux for Power, big endian - Extended Update Support7.6ppc64
Red Hat Enterprise Linux for Power, big endian - Extended Update Support7.5ppc64
Red Hat Enterprise Linux for Power, big endian - Extended Update Support7.4ppc64
Red Hat Enterprise Linux for IBM z Systems7s390x
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support7.7s390x
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support7.6s390x
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support7.5s390x
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support7.4s390x
Red Hat Enterprise Linux Workstation7x86_64
Red Hat Enterprise Linux Server7x86_64
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions7.7ppc64le
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions7.6ppc64le
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions7.4ppc64le
Red Hat Enterprise Linux Server - TUS7.7x86_64
Red Hat Enterprise Linux Server - TUS7.6x86_64
Red Hat Enterprise Linux Server - TUS7.4x86_64
Red Hat Enterprise Linux Server - Extended Life Cycle Support7x86_64
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian7ppc64le
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian7ppc64
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems)7s390x
Red Hat Enterprise Linux Server - AUS7.7x86_64
Red Hat Enterprise Linux Server - AUS7.6x86_64
Red Hat Enterprise Linux Server - AUS7.4x86_64
Red Hat Enterprise Linux EUS Compute Node7.7x86_64
Red Hat Enterprise Linux EUS Compute Node7.6x86_64
Red Hat Enterprise Linux EUS Compute Node7.5x86_64
Red Hat Enterprise Linux EUS Compute Node7.4x86_64
Red Hat Enterprise Linux Desktop7x86_64

Updated Packages

  • mod_ldap-2.4.6-67.el7_4.2.ppc64.rpm
  • httpd-tools-2.4.6-67.el7_4.2.s390x.rpm
  • mod_ssl-2.4.6-67.el7_4.2.x86_64.rpm
  • httpd-debuginfo-2.4.6-67.el7_4.2.ppc64le.rpm
  • mod_proxy_html-2.4.6-67.el7_4.2.aarch64.rpm
  • mod_proxy_html-2.4.6-67.el7_4.2.ppc64.rpm
  • mod_session-2.4.6-67.el7_4.2.ppc64le.rpm
  • httpd-debuginfo-2.4.6-67.el7_4.2.x86_64.rpm
  • mod_proxy_html-2.4.6-67.el7_4.2.ppc64le.rpm
  • httpd-devel-2.4.6-67.el7_4.2.ppc64.rpm
  • mod_proxy_html-2.4.6-67.el7_4.2.x86_64.rpm
  • httpd-tools-2.4.6-67.el7_4.2.aarch64.rpm
  • mod_session-2.4.6-67.el7_4.2.s390x.rpm
  • mod_session-2.4.6-67.el7_4.2.x86_64.rpm
  • mod_session-2.4.6-67.el7_4.2.ppc64.rpm
  • httpd-manual-2.4.6-67.el7_4.2.noarch.rpm
  • mod_ssl-2.4.6-67.el7_4.2.ppc64.rpm
  • httpd-debuginfo-2.4.6-67.el7_4.2.ppc64.rpm
  • mod_ldap-2.4.6-67.el7_4.2.aarch64.rpm
  • httpd-2.4.6-67.el7_4.2.aarch64.rpm
  • httpd-2.4.6-67.el7_4.2.ppc64le.rpm
  • httpd-devel-2.4.6-67.el7_4.2.aarch64.rpm
  • httpd-2.4.6-67.el7_4.2.x86_64.rpm
  • httpd-tools-2.4.6-67.el7_4.2.ppc64le.rpm
  • httpd-2.4.6-67.el7_4.2.ppc64.rpm
  • httpd-2.4.6-67.el7_4.2.src.rpm
  • httpd-2.4.6-67.el7_4.2.s390x.rpm
  • httpd-debuginfo-2.4.6-67.el7_4.2.s390x.rpm
  • httpd-devel-2.4.6-67.el7_4.2.s390x.rpm
  • httpd-tools-2.4.6-67.el7_4.2.x86_64.rpm
  • mod_ldap-2.4.6-67.el7_4.2.x86_64.rpm
  • mod_ldap-2.4.6-67.el7_4.2.s390x.rpm
  • mod_ssl-2.4.6-67.el7_4.2.aarch64.rpm
  • mod_session-2.4.6-67.el7_4.2.aarch64.rpm
  • mod_ssl-2.4.6-67.el7_4.2.s390x.rpm
  • httpd-tools-2.4.6-67.el7_4.2.ppc64.rpm
  • httpd-debuginfo-2.4.6-67.el7_4.2.aarch64.rpm
  • httpd-devel-2.4.6-67.el7_4.2.x86_64.rpm
  • mod_ldap-2.4.6-67.el7_4.2.ppc64le.rpm
  • mod_proxy_html-2.4.6-67.el7_4.2.s390x.rpm
  • mod_ssl-2.4.6-67.el7_4.2.ppc64le.rpm
  • httpd-devel-2.4.6-67.el7_4.2.ppc64le.rpm

Fixes

CVEs

References


Additional information