Описание
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.4.29-1ubuntu4.25 |
devel | released | 2.4.54-2ubuntu1 |
esm-infra-legacy/trusty | not-affected | 2.4.7-1ubuntu4.22+esm8 |
esm-infra/bionic | not-affected | 2.4.29-1ubuntu4.25 |
esm-infra/focal | not-affected | 2.4.41-4ubuntu3.12 |
esm-infra/xenial | released | 2.4.18-2ubuntu3.17+esm7 |
focal | released | 2.4.41-4ubuntu3.12 |
impish | released | 2.4.48-3.1ubuntu3.5 |
jammy | released | 2.4.52-1ubuntu4.1 |
kinetic | released | 2.4.54-2ubuntu1 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
If Apache HTTP Server 2.4.53 is configured to do transformations with ...
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
Уязвимость фильтра содержимого mod_sed веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5 Medium
CVSS2
7.5 High
CVSS3