Linux 2986 Published by

The following two security updates are available for Ubuntu Linux:

[USN-6901-1] stunnel vulnerability
[USN-6902-1] Apache HTTP Server vulnerability




[USN-6901-1] stunnel vulnerability


==========================================================================
Ubuntu Security Notice USN-6901-1
July 18, 2024

stunnel vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

stunnel could allow unintended access to network services.

Software Description:
- stunnel4: Universal SSL tunnel for network daemons

Details:

It was discovered that stunnel did not properly validate client
certificates when configured to use both the redirect and verifyChain
options. A remote attacker could potentially use this issue to obtain
sensitive information by accessing the tunneled service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
stunnel4 3:5.56-1ubuntu0.2

Ubuntu 18.04 LTS
stunnel4 3:5.44-1ubuntu3+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6901-1
CVE-2021-20230

Package Information:
https://launchpad.net/ubuntu/+source/stunnel4/3:5.56-1ubuntu0.2



[USN-6902-1] Apache HTTP Server vulnerability


==========================================================================
Ubuntu Security Notice USN-6902-1
July 18, 2024

apache2 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Apache HTTP Server could be made to expose sensitive information over the
network.

Software Description:
- apache2: Apache HTTP server

Details:

It was discovered that the Apache HTTP Server incorrectly handled certain
handlers configured via AddType. A remote attacker could possibly use this
issue to obtain source code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
apache2 2.4.58-1ubuntu8.4

Ubuntu 22.04 LTS
apache2 2.4.52-1ubuntu4.12

Ubuntu 20.04 LTS
apache2 2.4.41-4ubuntu3.21

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6902-1
CVE-2024-40725

Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.58-1ubuntu8.4
https://launchpad.net/ubuntu/+source/apache2/2.4.52-1ubuntu4.12
https://launchpad.net/ubuntu/+source/apache2/2.4.41-4ubuntu3.21