MGASA-2023-0032

Source
https://advisories.mageia.org/MGASA-2023-0032.html
Import Source
https://advisories.mageia.org/MGASA-2023-0032.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0032
Related
Published
2023-02-07T00:06:39Z
Modified
2023-02-06T22:57:37Z
Summary
Updated apache packages fix security vulnerability
Details

CVE-2022-37436: Apache HTTP Server: mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response splitting. Prior to 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client. Credits: Dimas Fariski Setyawan Putra (@nyxsorcerer)

CVE-2022-36760: Apache HTTP Server: modproxyajp Possible request smuggling. Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in modproxyajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. Credits: ZeddYu_Lu from Qi'anxin Research Institute of Legendsec at Qi'anxin Group

CVE-2006-20001: mod_dav out of bounds read, or write of zero byte A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.

References
Credits

Affected packages

Mageia:8 / apache

Package

Name
apache
Purl
pkg:rpm/mageia/apache?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.55-1.mga8

Ecosystem specific

{
    "section": "core"
}