Updated apache packages fix security vulnerabilities
Publication date: 21 Dec 2021Modification date: 21 Dec 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-44224 , CVE-2021-44790
Description
Updated apache packages fix security vulnerabilities:
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests
on) can cause a crash (NULL pointer dereference) or, for configurations
mixing forward and reverse proxy declarations, can allow for requests to
be directed to a declared Unix Domain Socket endpoint (Server Side Request
Forgery) (CVE-2021-44224).
A carefully crafted request body can cause a buffer overflow in the mod_lua
multipart parser (r:parsebody() called from Lua scripts). The Apache httpd
team is not aware of an exploit for the vulnerabilty though it might be
possible to craft one (CVE-2021-44790).
References
- https://bugs.mageia.org/show_bug.cgi?id=29791
- https://downloads.apache.org/httpd/Announcement2.4.html
- https://downloads.apache.org/httpd/CHANGES_2.4.52
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
SRPMS
8/core
- apache-2.4.52-1.mga8