Name | CVE-2021-36160 |
Description | A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2768-1, DSA-4982-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
apache2 (PTS) | bullseye | 2.4.62-1~deb11u1 | fixed |
| bullseye (security) | 2.4.62-1~deb11u2 | fixed |
| bookworm, bookworm (security) | 2.4.62-1~deb12u2 | fixed |
| sid, trixie | 2.4.62-3 | fixed |
uwsgi (PTS) | bullseye | 2.0.19.1-7.1 | vulnerable |
| bookworm | 2.0.21-5.1 | vulnerable |
| sid, trixie | 2.0.28-1 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[stretch] - apache2 <not-affected> (Vulnerable module not present)
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160
https://github.com/apache/httpd/commit/b364cad72b48dd40fbc2850e525b845406520f0b
uwsgi since 2.0.15-11 drops building the libapache2-mod-proxy-uwsgi{,-dbg}
packages which are provided by src:apache2 itself.
Regression report: https://bz.apache.org/bugzilla/show_bug.cgi?id=65616
Regression patch: https://github.com/apache/httpd/commit/8966e290a6e947fad0289bf4e243b0b552e13726 (2.4.x)