~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2017-12171

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2017-12171
2
 
PublicDate: 2017-10-24
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12171
5
 
Description:
6
 
 httpd does not properly parse comments, resulting in the '#' character
7
 
 in "Allow" statements to accidentally match all IP addresses. This can
8
 
 lead to a bypass of intended security restrictions.
9
 
Ubuntu-Description:
10
 
Notes:
11
 
 mdeslaur> caused by rhel 6.9 specific patch
12
 
Bugs:
13
 
 https://bugzilla.redhat.com/show_bug.cgi?id=1493056
14
 
Priority: low
15
 
Discovered-by: KAWAHARA Masashi
16
 
Assigned-to:
17
 
 
18
 
 
19
 
Patches_apache2:
20
 
upstream_apache2: needs-triage
21
 
precise/esm_apache2: not-affected (code not present)
22
 
trusty_apache2: not-affected (code not present)
23
 
xenial_apache2: not-affected (code not present)
24
 
zesty_apache2: ignored (reached end-of-life)
25
 
artful_apache2: not-affected (code not present)
26
 
devel_apache2: not-affected (code not present)