Mageia alert MGASA-2021-0577 (apache)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2021-0577: Updated apache packages fix security vulnerabilities | |
Date: | Wed, 22 Dec 2021 00:28:33 +0100 | |
Message-ID: | <20211221232833.317AD9FFF7@duvel.mageia.org> | |
Archive-link: | Article |
MGASA-2021-0577 - Updated apache packages fix security vulnerabilities Publication date: 21 Dec 2021 URL: https://advisories.mageia.org/MGASA-2021-0577.html Type: security Affected Mageia releases: 8 CVE: CVE-2021-44224, CVE-2021-44790 Description: Updated apache packages fix security vulnerabilities: A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery) (CVE-2021-44224). A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one (CVE-2021-44790). References: - https://bugs.mageia.org/show_bug.cgi?id=29791 - https://downloads.apache.org/httpd/Announcement2.4.html - https://downloads.apache.org/httpd/CHANGES_2.4.52 - https://httpd.apache.org/security/vulnerabilities_24.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4... SRPMS: - 8/core/apache-2.4.52-1.mga8