Bug 1560634 (CVE-2018-1312)
Summary: | CVE-2018-1312 httpd: Weak Digest auth nonce generation in mod_auth_digest | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | apmukher, bnater, b.prins, csutherl, dffrench, drusso, gzaronik, hhorak, jclere, jdoyle, jkaluza, jmadigan, jorton, jshepherd, lgao, lgriffin, luhliari, mbabacek, mturk, myarboro, ngough, pahan, psampaio, pslavice, pwright, rrajasek, rsvoboda, trepel, twalsh, weli, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | httpd 2.4.30 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:18:37 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1560635, 1560636, 1566317, 1566318, 1566319, 1719722 | ||
Bug Blocks: | 1560402 |
Description
Pedro Sampaio
2018-03-26 15:41:26 UTC
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1560635] Upstream patchset: https://svn.apache.org/viewvc?view=revision&revision=1824481 Upstream bug: https://bz.apache.org/bugzilla/show_bug.cgi?id=54637 Statement: The "AuthType Digest" directive is not enabled in the default httpd configuration as shipped with Red Hat Enterprise Linux, and needs to be explicitly enabled. Therefore this flaw has no impact on the default versions of the httpd package as shipped with Red Hat Enterprise Linux. Also upstream discourages the use of mod_auth_digest because of its inherent security weaknesses and recommends the use of mod_ssl. This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2018:3558 This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0366 This issue has been addressed in the following products: JBoss Core Services on RHEL 6 JBoss Core Services on RHEL 7 Via RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:0367 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1898 https://access.redhat.com/errata/RHSA-2019:1898 |