-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.2341
                          apache2 security update
                                9 July 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           apache2
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
                   Reduced Security                -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-31618 CVE-2021-30641 CVE-2021-26691
                   CVE-2021-26690 CVE-2020-35452 

Reference:         ESB-2021.2229
                   ESB-2021.2196
                   ESB-2021.2097

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2021/msg00120.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4937-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 08, 2021                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : apache2
CVE ID         : CVE-2020-35452 CVE-2021-26690 CVE-2021-26691 CVE-2021-30641 
                 CVE-2021-31618

Several vulnerabilities have been found in the Apache HTTP server, which
could result in denial of service. In addition the implementation of
the MergeSlashes option could result in unexpected behaviour.

For the stable distribution (buster), these problems have been fixed in
version 2.4.38-3+deb10u5.

We recommend that you upgrade your apache2 packages.

For the detailed security status of apache2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/apache2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmDnMiAACgkQEMKTtsN8
TjbNqg/9Hrd2EqNC4ijkjHNI/B6K74GgElHVSNcF/vbOp0zmOHaRLaOr06rfXmz+
AYM9nJR4xNJQWaXKFXpCVNvmlaKKbgyiK1LFrslh4aOCVdaVxQIYlYEeOoHthc1K
fZawY6qhGf4VrgSkTNhaKakNikpf4lqh7L14LUFSA0b9nRkAy7CtqGuOzgEaUR26
qRUjPewKCeE2QhMgA63ne+XxPUF4I2WYEV8SPdKRfPmMwFlUpwB8bvherjDV+53H
ZRs81ZMHk05N1ESI2wYGSR/dh/xYqt/01cXJ636JR39AQR51beIVtxekzwTW/aPE
mC2ZY7aH4rsLqcFe3bJcVPQjD0r/fHUVSex1Mnr7mETD5aHAohUfHLEEV1+qR8Cx
gz8Z63k0KvmVNe7WetGzwsWnvOXnDdRr63qM0UqEkd3Tre0tLWXjmTUfdUcicAof
NsXPtJT8eNwi+E9YmpY5IQRE88uQ2sk2NTGaQ4EetMpLqX5h7brF15OTVxqVbUPP
sqAZpgz6lD2Y0P4tXGCYP3u+B48pcNqOS66JJNHO9gJgVu3O+MDQFss+Z5P5JKzI
H/KJMv58eFlyP+SsGZbHcDuH/IN8ZMvJA4gsrtHDzRoowFBOS1zDXJjEYdAlzEyq
B1SgwN1PXkxPDUAF2+z9dvAeEOrMUUhQhTOC4OnxFxPssSwHEps=
=O0O+
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=cnqZ
-----END PGP SIGNATURE-----