==========================================================================
Ubuntu Security Notice USN-3370-1
July 27, 2017
apache2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Apache HTTP Server could be made to crash or leak sensitive information if
it received specially crafted network traffic.
Software Description:
– apache2: Apache HTTP server
Details:
Robert Święcki discovered that the Apache HTTP Server mod_auth_digest
module incorrectly cleared values when processing certain requests. A
remote attacker could use this issue to cause the server to crash,
resulting in a denial or service, or possibly obtain sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
apache2-bin 2.4.25-3ubuntu2.2
Ubuntu 16.04 LTS:
apache2-bin 2.4.18-2ubuntu3.4
Ubuntu 14.04 LTS:
apache2-bin 2.4.7-1ubuntu4.17
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3370-1
CVE-2017-9788
Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.25-3ubuntu2.2
https://launchpad.net/ubuntu/+source/apache2/2.4.18-2ubuntu3.4
https://launchpad.net/ubuntu/+source/apache2/2.4.7-1ubuntu4.17
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=imNS
—–END PGP SIGNATURE—–
—