|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0577 (apache)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0577: Updated apache packages fix security vulnerabilities
Date:  Wed, 22 Dec 2021 00:28:33 +0100
Message-ID:  <20211221232833.317AD9FFF7@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0577 - Updated apache packages fix security vulnerabilities Publication date: 21 Dec 2021 URL: https://advisories.mageia.org/MGASA-2021-0577.html Type: security Affected Mageia releases: 8 CVE: CVE-2021-44224, CVE-2021-44790 Description: Updated apache packages fix security vulnerabilities: A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery) (CVE-2021-44224). A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one (CVE-2021-44790). References: - https://bugs.mageia.org/show_bug.cgi?id=29791 - https://downloads.apache.org/httpd/Announcement2.4.html - https://downloads.apache.org/httpd/CHANGES_2.4.52 - https://httpd.apache.org/security/vulnerabilities_24.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4... SRPMS: - 8/core/apache-2.4.52-1.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds