MGASA-2023-0100

Source
https://advisories.mageia.org/MGASA-2023-0100.html
Import Source
https://advisories.mageia.org/MGASA-2023-0100.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0100
Related
Published
2023-03-18T22:16:28Z
Modified
2023-03-18T21:07:28Z
Summary
Updated apache packages fix security vulnerability
Details

Some modproxy configurations on Apache HTTP Server allow a HTTP request smuggling attack. Configurations are affected when modproxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. (CVE-2023-25690) HTTP Response Smuggling vulnerability in Apache HTTP Server via modproxyuwsgi. This issue affects Apache HTTP Server. Special characters in the origin response header can truncate/split the response forwarded to the client. (CVE-2023-27522)

References
Credits

Affected packages

Mageia:8 / apache

Package

Name
apache
Purl
pkg:rpm/mageia/apache?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.56-1.mga8

Ecosystem specific

{
    "section": "core"
}