Mageia 2021-0577: apache security update
Summary
Updated apache packages fix security vulnerabilities:
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests
on) can cause a crash (NULL pointer dereference) or, for configurations
mixing forward and reverse proxy declarations, can allow for requests to
be directed to a declared Unix Domain Socket endpoint (Server Side Request
Forgery) (CVE-2021-44224).
A carefully crafted request body can cause a buffer overflow in the mod_lua
multipart parser (r:parsebody() called from Lua scripts). The Apache httpd
team is not aware of an exploit for the vulnerabilty though it might be
possible to craft one (CVE-2021-44790).
References
- https://bugs.mageia.org/show_bug.cgi?id=29791
- https://downloads.apache.org/httpd/Announcement2.4.html
- - https://httpd.apache.org/security/vulnerabilities_24.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
Resolution
MGASA-2021-0577 - Updated apache packages fix security vulnerabilities
SRPMS
- 8/core/apache-2.4.52-1.mga8