Updated apache packages fix security vulnerabilities
Publication date: 21 Dec 2021Modification date: 21 Dec 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-44224 , CVE-2021-44790
Description
Updated apache packages fix security vulnerabilities: A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery) (CVE-2021-44224). A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one (CVE-2021-44790).
References
- https://bugs.mageia.org/show_bug.cgi?id=29791
- https://downloads.apache.org/httpd/Announcement2.4.html
- https://downloads.apache.org/httpd/CHANGES_2.4.52
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
SRPMS
8/core
- apache-2.4.52-1.mga8