The latest upgrade has the following in the ChangeLog:
apache2 (2.2.22-4) unstable; urgency=high
* CVE-2012-0216: Remove "Alias /doc /usr/share/doc" from the default virtual
hosts' config files.
If scripting modules like mod_php or mod_rivet are enabled on systems
where either 1) some frontend server forwards connections to an apache2
backend server on the localhost address, or 2) the machine running
apache2 is also used for web browsing, this could allow a remote
attacker to execute example scripts stored under /usr/share/doc.
Depending on the installed packages, this could lead to issues like cross
site scripting, code execution, or leakage of sensitive data.
However this change does not fix the real problem, just the default
configuration. Debian should provide security information about
problems like that (see below the details about these problems), in
README.Debian or some separate information file (with "security" in
Also, it would be better to fix the scripting modules or their default
configuration so that they are enabled only when requested explicitly
on a per-directory basis (a bit like ExecCGI for the mod_cgi module?).
The admin of the machine or the end user (e.g. via his public_html in
his home dir) may want to link to some doc directory like /usr/share/doc
or $HOME/doc (if he installs software in his home dir). He may also want
to allow these doc to be accessible from remote machines. Scripts from
these directories should be read as text files, not executed. And the
user should know what to do to ensure that.
Even if the admin or the end user thinks this is safe because packages
provided scripting modules are not installed, this may not be the case
in the future, and the problem may be more hidden if such packages are
installed via dependencies. So, it would be nice to know what to do
even if such packages are not installed/enabled yet.
-- Package-specific info:
List of enabled modules from 'apache2 -M':
alias auth_basic authn_file authz_default authz_groupfile
authz_host authz_user autoindex cgi cgid dav dav_svn deflate dir
env mime negotiation perl python reqtimeout setenvif status
Kernel: Linux 3.2.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages apache2 depends on:
ii apache2-mpm-worker 2.2.22-4
ii apache2.2-common 2.2.22-4
apache2 recommends no packages.
apache2 suggests no packages.
Versions of packages apache2.2-common depends on:
ii apache2-utils 2.2.22-4
ii apache2.2-bin 2.2.22-4
ii lsb-base 4.1+Debian2
ii mime-support 3.52-1
ii perl 5.14.2-9
ii procps 1:3.3.2-3
Versions of packages apache2.2-common recommends:
ii ssl-cert 1.0.28
Versions of packages apache2.2-common suggests:
ii apache2-doc 2.2.22-4
ii apache2-suexec | apache2-suexec-custom <none>
ii chromium [www-browser] 18.0.1025.151~r130497-1
ii epiphany-browser [www-browser] 3.2.1-2
ii iceape [www-browser] 2.7.3-2
ii iceweasel [www-browser] 10.0.4esr-1
ii links [www-browser] 2.6-1
ii links2 [www-browser] 2.6-1
ii lynx-cur [www-browser] 2.8.8dev.12-2
ii midori [www-browser] 0.4.3-1
ii uzbl [www-browser] 0.0.0~git.20111128-2
ii w3m [www-browser] 0.5.3-5