Mageia 2023-0175: apache-mod_security security update
Summary
HTTP multipart requests were incorrectly parsed and could bypass the Web
Application Firewall (CVE-2022-48279)
Incorrect handling of '\0' bytes in file uploads in ModSecurity may allow
for Web Application Firewall bypasses and buffer over-reads on the Web
Application Firewall when executing rules that read the FILES_TMP_CONTENT
collection. (CVE-2023-24021)
References
- https://bugs.mageia.org/show_bug.cgi?id=31457
- https://www.debian.org/lts/security/2023/dla-3283
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24021
Resolution
MGASA-2023-0175 - Updated apache-mod_security packages fix security vulnerability
SRPMS
- 8/core/apache-mod_security-2.9.7-1.mga8