==========================================================================
Ubuntu Security Notice USN-3425-1
September 19, 2017
apache2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Apache HTTP Server could be made to expose sensitive information over the
network.
Software Description:
– apache2: Apache HTTP server
Details:
Hanno Böck discovered that the Apache HTTP Server incorrectly handled
Limit directives in .htaccess files. In certain configurations, a remote
attacker could possibly use this issue to read arbitrary server memory,
including sensitive information. This issue is known as Optionsbleed.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
apache2-bin 2.4.25-3ubuntu2.3
Ubuntu 16.04 LTS:
apache2-bin 2.4.18-2ubuntu3.5
Ubuntu 14.04 LTS:
apache2-bin 2.4.7-1ubuntu4.18
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3425-1
CVE-2017-9798
Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.25-3ubuntu2.3
https://launchpad.net/ubuntu/+source/apache2/2.4.18-2ubuntu3.5
https://launchpad.net/ubuntu/+source/apache2/2.4.7-1ubuntu4.18
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=900r
—–END PGP SIGNATURE—–
—