MGASA-2021-0577

Source
https://advisories.mageia.org/MGASA-2021-0577.html
Import Source
https://advisories.mageia.org/MGASA-2021-0577.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0577
Related
Published
2021-12-21T23:27:37Z
Modified
2021-12-21T22:50:16Z
Summary
Updated apache packages fix security vulnerabilities
Details

Updated apache packages fix security vulnerabilities: A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery) (CVE-2021-44224).

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one (CVE-2021-44790).

References
Credits

Affected packages

Mageia:8 / apache

Package

Name
apache
Purl
pkg:rpm/mageia/apache?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.52-1.mga8

Ecosystem specific

{
    "section": "core"
}