httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From build...@apache.org
Subject svn commit: r1003203 - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_24.html
Date Tue, 20 Dec 2016 21:26:41 GMT
Author: buildbot
Date: Tue Dec 20 21:26:41 2016
New Revision: 1003203

Log:
Staging update by buildbot for httpd

Modified:
    websites/staging/httpd/trunk/content/   (props changed)
    websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
    websites/staging/httpd/trunk/content/security/vulnerabilities_24.html

Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Tue Dec 20 21:26:41 2016
@@ -1 +1 @@
-1775356
+1775358

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Tue Dec 20 21:26:41
2016
@@ -184,6 +184,35 @@ We would like to thank Maksim Malyutin f
 <affects prod="httpd" version="2.4.1"/>
 </issue>
 
+<issue fixed="2.4.25" reported="20160120" public="20161220" released="20161220">
+<cve name="CVE-2016-0736"/>
+<severity level="4">low</severity>
+<title>Padding Oracle in Apache mod_session_crypto</title>
+<description><p>
+  Authenticate the session data/cookie presented to mod_session_crypto
+  with a MAC (SipHash) to prevent deciphering or tampering with a padding
+  oracle attack.
+</p></description>
+<acknowledgements>
+We would like to thank Alexander Neumann of RedTeam Pentesting for reporting 
+this issue.
+</acknowledgements>
+<affects prod="httpd" version="2.4.23"/>
+<affects prod="httpd" version="2.4.20"/>
+<affects prod="httpd" version="2.4.18"/>
+<affects prod="httpd" version="2.4.17"/>
+<affects prod="httpd" version="2.4.16"/>
+<affects prod="httpd" version="2.4.12"/>
+<affects prod="httpd" version="2.4.10"/>
+<affects prod="httpd" version="2.4.9"/>
+<affects prod="httpd" version="2.4.7"/>
+<affects prod="httpd" version="2.4.6"/>
+<affects prod="httpd" version="2.4.4"/>
+<affects prod="httpd" version="2.4.3"/>
+<affects prod="httpd" version="2.4.2"/>
+<affects prod="httpd" version="2.4.1"/>
+</issue>
+
 <issue fixed="2.2.32-dev" reported="20160702" public="20160718" released="20160718">
 <cve name="CVE-2016-5387"/>
 <severity level="0">n/a</severity>

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Tue Dec 20 21:26:41
2016
@@ -196,6 +196,32 @@ We would like to thank Maksim Malyutin f
       Affects: 
     2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3,
2.4.2, 2.4.1<p/></dd>
   <dd>
+    <b>low: </b>
+    <b>
+      <name name="CVE-2016-0736">Padding Oracle in Apache mod_session_crypto</name>
+    </b>
+    <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736">CVE-2016-0736</a>
+    <p>
+  Authenticate the session data/cookie presented to mod_session_crypto
+  with a MAC (SipHash) to prevent deciphering or tampering with a padding
+  oracle attack.
+</p>
+  </dd>
+  <dd>
+    <p>Acknowledgements: 
+We would like to thank Alexander Neumann of RedTeam Pentesting for reporting 
+this issue.
+</p>
+  </dd>
+  <dd>
+  Reported to security team: 20th January 2016<br/>
+  Issue public: 20th December 2016<br/></dd>
+  <dd>
+  Update Released: 20th December 2016<br/></dd>
+  <dd>
+      Affects: 
+    2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3,
2.4.2, 2.4.1<p/></dd>
+  <dd>
     <b>n/a: </b>
     <b>
       <name name="CVE-2016-8740">HTTP/2 CONTINUATION denial of service</name>



Mime
View raw message