Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2021.2127.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2021:2127-1)
Summary:The remote host is missing an update for the 'apache2' package(s) announced via the SUSE-SU-2021:2127-1 advisory.
Description:Summary:
The remote host is missing an update for the 'apache2' package(s) announced via the SUSE-SU-2021:2127-1 advisory.

Vulnerability Insight:
This update for apache2 fixes the following issues:

fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression

fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on
specially crafted HTTP/2 request

fixed CVE-2020-13950 [bsc#1187040]: mod_proxy NULL pointer dereference

fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in
mod_auth_digest

fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference
in parser

fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session

Affected Software/OS:
'apache2' package(s) on SUSE Linux Enterprise Module for Basesystem 15-SP2, SUSE Linux Enterprise Module for Basesystem 15-SP3, SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3, SUSE Linux Enterprise Module for Server Applications 15-SP2, SUSE Linux Enterprise Module for Server Applications 15-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-13950
https://security.netapp.com/advisory/ntap-20210702-0001/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://security.gentoo.org/glsa/202107-38
http://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://www.oracle.com/security-alerts/cpuoct2021.html
https://lists.apache.org/thread.html/rbe197409ae4a58b629fb792d1aed541ccbbf865121a80e1c5938d223@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2021/06/10/4
Common Vulnerability Exposure (CVE) ID: CVE-2020-35452
Debian Security Information: DSA-4937 (Google Search)
https://www.debian.org/security/2021/dsa-4937
https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html
https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602@%3Cannounce.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2021/06/10/5
Common Vulnerability Exposure (CVE) ID: CVE-2021-26690
https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865@%3Cannounce.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2021/06/10/6
Common Vulnerability Exposure (CVE) ID: CVE-2021-26691
https://www.oracle.com/security-alerts/cpujan2022.html
https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe@%3Cannounce.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2021/06/10/7
Common Vulnerability Exposure (CVE) ID: CVE-2021-30641
https://lists.apache.org/thread.html/r2b4773944d83d2799de9fbaeee7fe0f3fd72669467787e02f434cb10@%3Cannounce.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2021/06/10/8
Common Vulnerability Exposure (CVE) ID: CVE-2021-31618
https://security.netapp.com/advisory/ntap-20210727-0008/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NKJ3ZA3FTSZ2QBBPKS6BYGAWYRABNQQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A73QJ4HPUMU26I6EULG6SCK67TUEXZYR/
https://seclists.org/oss-sec/2021/q2/206
https://lists.apache.org/thread.html/r783b6558abf3305b17ea462bed4bd66d82866438999bf38cef6d11d1@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r14b66ef0f4f569fd515a3f96cd4eb58bd9a8ff525cc326bb0359664f@%3Ccvs.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2021/06/10/9
http://www.openwall.com/lists/oss-security/2024/03/13/2
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.