Name | CVE-2021-36160 |
Description | A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2768-1, DSA-4982-1, ELA-487-1, ELA-487-2 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
apache2 (PTS) | jessie, jessie (lts) | 2.4.10-10+deb8u29 | fixed |
| stretch (security) | 2.4.25-3+deb9u13 | fixed |
| stretch (lts), stretch | 2.4.25-3+deb9u19 | fixed |
| buster, buster (lts) | 2.4.59-1~deb10u4 | fixed |
| buster (security) | 2.4.59-1~deb10u1 | fixed |
| bullseye | 2.4.62-1~deb11u1 | fixed |
| bullseye (security) | 2.4.62-1~deb11u2 | fixed |
| bookworm (security), bookworm | 2.4.62-1~deb12u2 | fixed |
| sid, trixie | 2.4.62-3 | fixed |
uwsgi (PTS) | jessie, jessie (lts) | 2.0.7-1+deb8u5 | fixed |
| stretch (security) | 2.0.14+20161117-3+deb9u5 | fixed |
| stretch (lts), stretch | 2.0.14+20161117-3+deb9u7 | fixed |
| buster | 2.0.18-1 | vulnerable |
| bullseye | 2.0.19.1-7.1 | vulnerable |
| bookworm | 2.0.21-5.1 | vulnerable |
| sid, trixie | 2.0.28-1 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[stretch] - apache2 <not-affected> (Vulnerable module not present)
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160
https://github.com/apache/httpd/commit/b364cad72b48dd40fbc2850e525b845406520f0b
uwsgi since 2.0.15-11 drops building the libapache2-mod-proxy-uwsgi{,-dbg}
packages which are provided by src:apache2 itself.
Regression report: https://bz.apache.org/bugzilla/show_bug.cgi?id=65616
Regression patch: https://github.com/apache/httpd/commit/8966e290a6e947fad0289bf4e243b0b552e13726 (2.4.x)
[jessie] - apache2 <not-affected> (Vulnerable module not present)