Sakin uwar garken Apache 2.4.52 http tare da gyara zubar da ruwa a cikin mod_lua

An saki uwar garken HTTP Apache 2.4.52, yana gabatar da canje-canje 25 da kuma kawar da lahani 2:

  • CVE-2021-44790 buffer ambaliya ne a cikin mod_lua wanda ke faruwa lokacin da ake tantance buƙatun sassa da yawa. Rashin lahani yana rinjayar tsarin saiti wanda rubutun Lua ke kiran aikin r:parsebody() don tantance jikin buƙatun, yana barin maharin ya haifar da ambaliya ta hanyar aika buƙatun ƙira na musamman. Har yanzu ba a gano wata shaidar cin zarafi ba, amma matsalar na iya haifar da aiwatar da lambar ta akan sabar.
  • CVE-2021-44224 - SSRF (Server Side Request Forgery) rashin lahani a cikin mod_proxy, wanda ke ba da izini, a cikin jeri tare da saitin "ProxyRequests on", ta hanyar buƙatun URI na musamman da aka ƙera, don cimma buƙatun buƙatun zuwa wani mai kulawa akan iri ɗaya. uwar garken da ke karɓar haɗi ta hanyar Unix Domain Socket. Hakanan za'a iya amfani da batun don haifar da haɗari ta hanyar ƙirƙira sharuɗɗan ɓata ma'ana mara amfani. Batun yana shafar nau'ikan Apache httpd wanda ya fara daga sigar 2.4.7.

Mafi shaharar canje-canje marasa tsaro sune:

  • Ƙara goyon baya don ginawa tare da ɗakin karatu na OpenSSL 3 zuwa mod_ssl.
  • Ingantattun gano ɗakin karatu na OpenSSL a cikin rubutun autoconf.
  • A cikin mod_proxy, don ƙa'idodin tunneling, yana yiwuwa a kashe sake jujjuya haɗin haɗin TCP rabin-kusa ta hanyar saita ma'aunin "SetEnv proxy-nohalfclose".
  • Ƙarin ƙarin binciken da URIs ba a yi niyya don wakili ba sun ƙunshi tsarin http/https, kuma waɗanda aka yi nufin wakili sun ƙunshi sunan mai watsa shiri.
  • mod_proxy_connect da mod_proxy basa barin lambar matsayi ta canza bayan an aika ta ga abokin ciniki.
  • Lokacin aika martani na tsaka-tsaki bayan karɓar buƙatun tare da taken "Expect: 100-Continue", tabbatar da cewa sakamakon yana nuna matsayin "100 Ci gaba" maimakon halin yanzu na buƙatar.
  • mod_dav yana ƙara goyan baya don kari na CalDAV, waɗanda ke buƙatar duk abubuwan daftarin aiki da abubuwan kaddarorin da za a yi la'akari da su yayin samar da dukiya. An ƙara sabbin ayyuka dav_validate_root_ns(), dav_find_child_ns(), dav_find_next_ns(), dav_find_attr_ns () da dav_find_attr (), waɗanda za'a iya kiran su daga wasu kayayyaki.
  • A cikin mpm_event, matsalar dakatar da ayyukan yara marasa aiki bayan an warware yawan lodin uwar garken.
  • Mod_http2 yana da ƙayyadaddun canje-canje na koma baya wanda ya haifar da halayen da ba daidai ba lokacin da ake sarrafa ƙuntatawa na MaxRequestsPerChild da MaxConnectionsPerChild.
  • Ƙarfin tsarin mod_md, wanda aka yi amfani da shi don sarrafa karɓa da kiyaye takaddun shaida ta amfani da ka'idar ACME (Automatic Certificate Management Environment), an faɗaɗa:
    • Ƙara goyon baya don tsarin daurin lissafi na waje na ACME (EAB), an kunna ta ta amfani da umarnin MDexternalAccountBinding. Ana iya daidaita ƙimar EAB daga fayil ɗin JSON na waje, guje wa fallasa sigogin tantancewa a cikin babban fayil ɗin saitin uwar garken.
    • Umarnin 'MDCertificateAuthority' yana tabbatar da cewa sigar URL ta ƙunshi http/https ko ɗaya daga cikin sunayen da aka riga aka ƙayyade ('LetsEncrypt', 'LetsEncrypt-Test', 'Buypass' da 'Buypass-Test').
    • An ba da izini don ƙayyade umarnin MDContactEmail a cikin sashin .
    • An gyara kurakurai da yawa, gami da ƙwanƙwasa ƙwaƙwalwar ajiya da ke faruwa lokacin loda maɓalli na sirri ya gaza.

source: budenet.ru

Add a comment