安全公告详情

NS-SA-2023-0109

2023-07-15 14:29:09

简介

important: httpd/docker-ce security update

严重级别

important

主题

An update for httpd/docker-ce is now available for NewStart CGSL MAIN 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

httpd: The httpd-devel package contains the APXS binary and other files that you need to build Dynamic Shared Objects (DSOs) for the Apache HTTP Server. If you are installing the Apache HTTP server and you want to be able to compile or develop additional modules for Apache, you need to install this package.
docker-ce: Docker is an open source project to build, ship and run any application as a lightweight container. Docker containers are both hardware-agnostic and platform-agnostic. This means they can run anywhere, from your laptop to the largest EC2 compute instance and everything in between - and they don't require you to use a particular language, framework or packaging system. That makes them great building blocks for deploying and scaling web apps, databases, and backend services without depending on a particular stack or provider.


Security Fix(es):
httpd: The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.(CVE-2013-6438)
httpd: The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.(CVE-2014-0098)
httpd: A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.(CVE-2022-22720)
httpd: A vulnerability was found in httpd. This security issue occurs when some mod_proxy configurations on Apache HTTP Server allow an HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.(CVE-2023-25690)
httpd: bugfix
docker-ce: A flaw was found in Moby. This flaw allows an attacker to bypass primary group restrictions due to a flaw in the supplementary group access setup.(CVE-2022-36109)
docker-ce: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F51B4.

影响组件

  • httpd
  • docker-ce

影响产品

  • CGSL MAIN 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["httpd-devel-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.x86_64.rpm","mod_proxy_html-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.x86_64.rpm","mod_ssl-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.x86_64.rpm","mod_session-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.x86_64.rpm","mod_ldap-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.x86_64.rpm","httpd-debuginfo-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.x86_64.rpm","httpd-manual-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.noarch.rpm","httpd-tools-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.x86_64.rpm","httpd-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.x86_64.rpm"],"source":"httpd-2.4.6-97.el7_9.5.cgslv5_4.0.3.gebcfa36.src.rpm"},{"binary":["docker-ce-17.03.3-1.el7.2303251302git08a1b3c.x86_64.rpm","docker-ce-debuginfo-17.03.3-1.el7.2303251302git08a1b3c.x86_64.rpm"],"source":"docker-ce-17.03.3-1.el7.2303251302git08a1b3c.src.rpm"}]}]}

CVE

参考