USN-5090-3

Source
https://ubuntu.com/security/notices/USN-5090-3
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5090-3.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5090-3
Published
2021-09-28T13:28:37Z
Modified
2026-04-22T10:18:18.969795Z
Summary
apache2 regression
Details

USN-5090-1 fixed vulnerabilities in Apache HTTP Server. One of the upstream fixes introduced a regression in UDS URIs. This update fixes the problem.

Original advisory details:

James Kettle discovered that the Apache HTTP Server HTTP/2 module incorrectly handled certain crafted methods. A remote attacker could possibly use this issue to perform request splitting or cache poisoning attacks. (CVE-2021-33193)

It was discovered that the Apache HTTP Server incorrectly handled certain malformed requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2021-34798)

Li Zhi Xin discovered that the Apache modproxyuwsgi module incorrectly handled certain request uri-paths. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 21.04. (CVE-2021-36160)

It was discovered that the Apache HTTP Server incorrectly handled escaping quotes. If the server was configured with third-party modules, a remote attacker could use this issue to cause the server to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2021-39275)

It was discovered that the Apache mod_proxy module incorrectly handled certain request uri-paths. A remote attacker could possibly use this issue to cause the server to forward requests to arbitrary origin servers. (CVE-2021-40438)

References

Affected packages

Ubuntu:18.04:LTS / apache2

Package

Name
apache2
Purl
pkg:deb/ubuntu/apache2@2.4.29-1ubuntu4.18?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.29-1ubuntu4.18

Affected versions

2.*
2.4.27-2ubuntu3
2.4.29-1ubuntu1
2.4.29-1ubuntu2
2.4.29-1ubuntu3
2.4.29-1ubuntu4
2.4.29-1ubuntu4.1
2.4.29-1ubuntu4.2
2.4.29-1ubuntu4.3
2.4.29-1ubuntu4.4
2.4.29-1ubuntu4.5
2.4.29-1ubuntu4.6
2.4.29-1ubuntu4.7
2.4.29-1ubuntu4.8
2.4.29-1ubuntu4.10
2.4.29-1ubuntu4.11
2.4.29-1ubuntu4.12
2.4.29-1ubuntu4.13
2.4.29-1ubuntu4.14
2.4.29-1ubuntu4.16
2.4.29-1ubuntu4.17

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "apache2",
            "binary_version": "2.4.29-1ubuntu4.18"
        },
        {
            "binary_name": "apache2-bin",
            "binary_version": "2.4.29-1ubuntu4.18"
        },
        {
            "binary_name": "apache2-data",
            "binary_version": "2.4.29-1ubuntu4.18"
        },
        {
            "binary_name": "apache2-suexec-custom",
            "binary_version": "2.4.29-1ubuntu4.18"
        },
        {
            "binary_name": "apache2-suexec-pristine",
            "binary_version": "2.4.29-1ubuntu4.18"
        },
        {
            "binary_name": "apache2-utils",
            "binary_version": "2.4.29-1ubuntu4.18"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5090-3.json"

Ubuntu:20.04:LTS / apache2

Package

Name
apache2
Purl
pkg:deb/ubuntu/apache2@2.4.41-4ubuntu3.6?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.41-4ubuntu3.6

Affected versions

2.*
2.4.41-1ubuntu1
2.4.41-4ubuntu1
2.4.41-4ubuntu2
2.4.41-4ubuntu3
2.4.41-4ubuntu3.1
2.4.41-4ubuntu3.3
2.4.41-4ubuntu3.4
2.4.41-4ubuntu3.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "apache2",
            "binary_version": "2.4.41-4ubuntu3.6"
        },
        {
            "binary_name": "apache2-bin",
            "binary_version": "2.4.41-4ubuntu3.6"
        },
        {
            "binary_name": "apache2-data",
            "binary_version": "2.4.41-4ubuntu3.6"
        },
        {
            "binary_name": "apache2-suexec-custom",
            "binary_version": "2.4.41-4ubuntu3.6"
        },
        {
            "binary_name": "apache2-suexec-pristine",
            "binary_version": "2.4.41-4ubuntu3.6"
        },
        {
            "binary_name": "apache2-utils",
            "binary_version": "2.4.41-4ubuntu3.6"
        },
        {
            "binary_name": "libapache2-mod-md",
            "binary_version": "2.4.41-4ubuntu3.6"
        },
        {
            "binary_name": "libapache2-mod-proxy-uwsgi",
            "binary_version": "2.4.41-4ubuntu3.6"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5090-3.json"