[USN-6901-1] stunnel vulnerability
[USN-6902-1] Apache HTTP Server vulnerability
[USN-6901-1] stunnel vulnerability
==========================================================================
Ubuntu Security Notice USN-6901-1
July 18, 2024
stunnel vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
stunnel could allow unintended access to network services.
Software Description:
- stunnel4: Universal SSL tunnel for network daemons
Details:
It was discovered that stunnel did not properly validate client
certificates when configured to use both the redirect and verifyChain
options. A remote attacker could potentially use this issue to obtain
sensitive information by accessing the tunneled service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
stunnel4 3:5.56-1ubuntu0.2
Ubuntu 18.04 LTS
stunnel4 3:5.44-1ubuntu3+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6901-1
CVE-2021-20230
Package Information:
https://launchpad.net/ubuntu/+source/stunnel4/3:5.56-1ubuntu0.2
[USN-6902-1] Apache HTTP Server vulnerability
==========================================================================
Ubuntu Security Notice USN-6902-1
July 18, 2024
apache2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Apache HTTP Server could be made to expose sensitive information over the
network.
Software Description:
- apache2: Apache HTTP server
Details:
It was discovered that the Apache HTTP Server incorrectly handled certain
handlers configured via AddType. A remote attacker could possibly use this
issue to obtain source code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
apache2 2.4.58-1ubuntu8.4
Ubuntu 22.04 LTS
apache2 2.4.52-1ubuntu4.12
Ubuntu 20.04 LTS
apache2 2.4.41-4ubuntu3.21
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6902-1
CVE-2024-40725
Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.58-1ubuntu8.4
https://launchpad.net/ubuntu/+source/apache2/2.4.52-1ubuntu4.12
https://launchpad.net/ubuntu/+source/apache2/2.4.41-4ubuntu3.21