[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1029123: bullseye-pu: package apache2/2.4.55-1~deb11u1



Hi,

On Sat, Mar 18, 2023 at 05:42:40PM +0000, Adam D. Barratt wrote:
> On Wed, 2023-01-18 at 11:25 +0400, Yadd wrote:
> > Apache2 has 3 new security issues:
> >  * CVE-2006-20001: mod_dav out of bounds read, or write of zero byte.
> >    A carefully crafted If: request header can cause a memory read, or
> > write
> >    of a single zero byte, in a pool (heap) memory location beyond the
> > header
> >    value sent. This could cause the process to crash.
> >  * CVE-2022-36760: mod_proxy_ajp Possible request smuggling.
> >    Inconsistent Interpretation of HTTP Requests ('HTTP Request
> > Smuggling')
> >    vulnerability in mod_proxy_ajp of Apache HTTP Server allows an
> > attacker
> >    to smuggle requests to the AJP server it forwards requests to.
> >  * CVE-2022-37436: mod_proxy prior to 2.4.55 allows a backend to
> > trigger HTTP
> >    response splitting.
> >    A malicious backend can cause the response headers to be truncated
> > early,
> >    resulting in some headers being incorporated into the response
> > body. If
> >    the later headers have any security purpose, they will not be
> > interpreted
> >    by the client.
> 
> Apologies for letting this fall through the cracks until now.
> 
> >From comments in #1032977, it sounds as if this request has been
> effectively superseded by an impending DSA release?

Yes, there will be a DSA release for apache2 based on 2.4.56 upstream
(versioned 2.4.56-1~deb11u1), which will include those changes as
well.

Regards,
Salvatore


Reply to: