Vulnerability from csaf_opensuse
Published
2019-04-16 08:27
Modified
2019-04-16 08:27
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child
processes or threads to execute arbitrary code with the privileges of the
parent process. Attackers with control over CGI scripts or extension modules
run by the server could have abused this issue to potentially gain super user
privileges. [bsc#1131233]
* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
URL normalization throughout all of its components. In particular,
consecutive slashes were not always collapsed. Attackers could potentially
abuse these inconsistencies to by-pass access control mechanisms and thus
gain unauthorized access to protected parts of the service. [bsc#1131241]
* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
a threaded server could have allowed users with valid credentials to
authenticate using another username, bypassing configured access control
restrictions. [bsc#1131239]
* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a
'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade
request from http/1.1 to http/2 that was not the first request on a
connection could lead to a misconfiguration and crash. This issue could have
been abused to mount a denial-of-service attack. Servers that never enabled
the h2 protocol or that only enabled it for https: and did not configure the
'H2Upgrade on' are unaffected. [bsc#1131245]
* CVE-2019-0196: Through specially crafted network input the Apache's http/2
request handler could be lead to access previously freed memory while
determining the method of a request. This resulted in the request being
misclassified and thus being processed incorrectly. [bsc#1131237]
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-1209
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for apache2", title: "Title of the patch", }, { category: "description", text: "This update for apache2 fixes the following issues:\n\n* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child\n processes or threads to execute arbitrary code with the privileges of the\n parent process. Attackers with control over CGI scripts or extension modules\n run by the server could have abused this issue to potentially gain super user\n privileges. [bsc#1131233]\n\n* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for\n URL normalization throughout all of its components. In particular,\n consecutive slashes were not always collapsed. Attackers could potentially\n abuse these inconsistencies to by-pass access control mechanisms and thus\n gain unauthorized access to protected parts of the service. [bsc#1131241]\n\n* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in\n a threaded server could have allowed users with valid credentials to\n authenticate using another username, bypassing configured access control\n restrictions. [bsc#1131239]\n\n* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a\n 'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade\n request from http/1.1 to http/2 that was not the first request on a\n connection could lead to a misconfiguration and crash. This issue could have\n been abused to mount a denial-of-service attack. Servers that never enabled\n the h2 protocol or that only enabled it for https: and did not configure the\n 'H2Upgrade on' are unaffected. [bsc#1131245]\n\n* CVE-2019-0196: Through specially crafted network input the Apache's http/2\n request handler could be lead to access previously freed memory while\n determining the method of a request. This resulted in the request being\n misclassified and thus being processed incorrectly. [bsc#1131237]\n\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-1209", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1209-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:1209-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L/#RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:1209-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L/#RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L", }, { category: "self", summary: "SUSE Bug 1131233", url: "https://bugzilla.suse.com/1131233", }, { category: "self", summary: "SUSE Bug 1131237", url: "https://bugzilla.suse.com/1131237", }, { category: "self", summary: "SUSE Bug 1131239", url: "https://bugzilla.suse.com/1131239", }, { category: "self", summary: "SUSE Bug 1131241", url: "https://bugzilla.suse.com/1131241", }, { category: "self", summary: "SUSE Bug 1131245", url: "https://bugzilla.suse.com/1131245", }, { category: "self", summary: "SUSE CVE CVE-2019-0196 page", url: "https://www.suse.com/security/cve/CVE-2019-0196/", }, { category: "self", summary: "SUSE CVE CVE-2019-0197 page", url: "https://www.suse.com/security/cve/CVE-2019-0197/", }, { category: "self", summary: "SUSE CVE CVE-2019-0211 page", url: "https://www.suse.com/security/cve/CVE-2019-0211/", }, { category: "self", summary: "SUSE CVE CVE-2019-0217 page", url: "https://www.suse.com/security/cve/CVE-2019-0217/", }, { category: "self", summary: "SUSE CVE CVE-2019-0220 page", url: "https://www.suse.com/security/cve/CVE-2019-0220/", }, ], title: "Security update for apache2", tracking: { current_release_date: "2019-04-16T08:27:23Z", generator: { date: "2019-04-16T08:27:23Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:1209-1", initial_release_date: "2019-04-16T08:27:23Z", revision_history: [ { date: "2019-04-16T08:27:23Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-2.4.33-lp150.2.17.1.i586", product_id: "apache2-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-devel-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-devel-2.4.33-lp150.2.17.1.i586", product_id: "apache2-devel-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-event-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-event-2.4.33-lp150.2.17.1.i586", product_id: "apache2-event-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-example-pages-2.4.33-lp150.2.17.1.i586", product_id: "apache2-example-pages-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-prefork-2.4.33-lp150.2.17.1.i586", product_id: "apache2-prefork-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-utils-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-utils-2.4.33-lp150.2.17.1.i586", product_id: "apache2-utils-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-worker-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-worker-2.4.33-lp150.2.17.1.i586", product_id: "apache2-worker-2.4.33-lp150.2.17.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "apache2-doc-2.4.33-lp150.2.17.1.noarch", product: { name: "apache2-doc-2.4.33-lp150.2.17.1.noarch", product_id: "apache2-doc-2.4.33-lp150.2.17.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-devel-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-devel-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-event-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-event-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-utils-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-utils-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-worker-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-worker-2.4.33-lp150.2.17.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.0", product: { name: "openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-devel-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-devel-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-lp150.2.17.1.noarch as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", }, product_reference: "apache2-doc-2.4.33-lp150.2.17.1.noarch", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-event-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-event-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-example-pages-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-prefork-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-utils-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-utils-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-worker-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-worker-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0196", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0196", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0196", url: "https://www.suse.com/security/cve/CVE-2019-0196", }, { category: "external", summary: "SUSE Bug 1131237 for CVE-2019-0196", url: "https://bugzilla.suse.com/1131237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "moderate", }, ], title: "CVE-2019-0196", }, { cve: "CVE-2019-0197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0197", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0197", url: "https://www.suse.com/security/cve/CVE-2019-0197", }, { category: "external", summary: "SUSE Bug 1131245 for CVE-2019-0197", url: "https://bugzilla.suse.com/1131245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "moderate", }, ], title: "CVE-2019-0197", }, { cve: "CVE-2019-0211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0211", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0211", url: "https://www.suse.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "SUSE Bug 1131233 for CVE-2019-0211", url: "https://bugzilla.suse.com/1131233", }, { category: "external", summary: "SUSE Bug 1132978 for CVE-2019-0211", url: "https://bugzilla.suse.com/1132978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "important", }, ], title: "CVE-2019-0211", }, { cve: "CVE-2019-0217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0217", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0217", url: "https://www.suse.com/security/cve/CVE-2019-0217", }, { category: "external", summary: "SUSE Bug 1131239 for CVE-2019-0217", url: "https://bugzilla.suse.com/1131239", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "moderate", }, ], title: "CVE-2019-0217", }, { cve: "CVE-2019-0220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0220", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0220", url: "https://www.suse.com/security/cve/CVE-2019-0220", }, { category: "external", summary: "SUSE Bug 1131241 for CVE-2019-0220", url: "https://bugzilla.suse.com/1131241", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "moderate", }, ], title: "CVE-2019-0220", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.