Description: | Summary: The remote host is missing an update for the 'httpd' package(s) announced via the SSA:2019-022-01 advisory.
Vulnerability Insight: New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/httpd-2.4.38-i586-1_slack14.2.txz: Upgraded. This release contains security fixes and improvements. mod_session: mod_session_cookie does not respect expiry time allowing sessions to be reused. [Hank Ibell] mod_http2: fixes a DoS attack vector. By sending slow request bodies to resources not consuming them, httpd cleanup code occupies a server thread unnecessarily. This was changed to an immediate stream reset which discards all stream state and incoming data. [Stefan Eissing] mod_ssl: Fix infinite loop triggered by a client-initiated renegotiation in TLSv1.2 (or earlier) with OpenSSL 1.1.1 and later. PR 63052. [Joe Orton] For more information, see: [links moved to references] (* Security fix *) +--------------------------+
Affected Software/OS: 'httpd' package(s) on Slackware 14.0, Slackware 14.1, Slackware 14.2, Slackware current.
Solution: Please install the updated package(s).
CVSS Score: 5.0
CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
|