Описание
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | code not present |
devel | released | 2.4.48-3.1ubuntu2 |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/bionic | not-affected | code not present |
esm-infra/focal | not-affected | 2.4.41-4ubuntu3.5 |
esm-infra/xenial | not-affected | code not present |
focal | released | 2.4.41-4ubuntu3.5 |
hirsute | released | 2.4.46-4ubuntu1.2 |
impish | released | 2.4.48-3.1ubuntu2 |
jammy | released | 2.4.48-3.1ubuntu2 |
Показывать по
Ссылки на источники
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read ...
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
5 Medium
CVSS2
7.5 High
CVSS3