Mageia 2022-0289: apache-mod_wsgi security update | LinuxSecurity.com
MGASA-2022-0289 - Updated apache-mod_wsgi packages fix security vulnerability

Publication date: 20 Aug 2022
URL: https://advisories.mageia.org/MGASA-2022-0289.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-2255

It was discovered that mod-wsgi did not correctly remove the X-Client-IP
header when processing requests from untrusted proxies. A remote attacker
could use this issue to pass the header to WSGI applications, contrary to
expectations (CVE-2022-2255).

References:
- https://bugs.mageia.org/show_bug.cgi?id=30711
- https://ubuntu.com/security/notices/USN-5551-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2255

SRPMS:
- 8/core/apache-mod_wsgi-4.6.8-4.1.mga8

Mageia 2022-0289: apache-mod_wsgi security update

It was discovered that mod-wsgi did not correctly remove the X-Client-IP header when processing requests from untrusted proxies

Summary

It was discovered that mod-wsgi did not correctly remove the X-Client-IP header when processing requests from untrusted proxies. A remote attacker could use this issue to pass the header to WSGI applications, contrary to expectations (CVE-2022-2255).

References

- https://bugs.mageia.org/show_bug.cgi?id=30711

- https://ubuntu.com/security/notices/USN-5551-1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2255

Resolution

MGASA-2022-0289 - Updated apache-mod_wsgi packages fix security vulnerability

SRPMS

- 8/core/apache-mod_wsgi-4.6.8-4.1.mga8

Severity
Publication date: 20 Aug 2022
URL: https://advisories.mageia.org/MGASA-2022-0289.html
Type: security
CVE: CVE-2022-2255

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.