Description
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2768-1 | uwsgi security update |
Debian DLA |
DLA-2768-2 | uwsgi regression update |
Debian DSA |
DSA-4982-1 | apache2 security update |
EUVD |
EUVD-2021-22784 | A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). |
Ubuntu USN |
USN-5090-1 | Apache HTTP Server vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Broadcom
Subscribe
Brocade Fabric Operating System Firmware
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Netapp
Subscribe
Cloud Backup
Subscribe
Clustered Data Ontap
Subscribe
Storagegrid
Subscribe
Oracle
Subscribe
Communications Cloud Native Core Network Function Cloud Native Environment
Subscribe
Enterprise Manager Base Platform
Subscribe
Http Server
Subscribe
Instantis Enterprisetrack
Subscribe
Peoplesoft Enterprise Peopletools
Subscribe
Zfs Storage Appliance Kit
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T00:47:43.818Z
Reserved: 2021-07-06T00:00:00.000Z
Link: CVE-2021-36160
No data.
Status : Analyzed
Published: 2021-09-16T15:15:07.330
Modified: 2025-05-01T15:40:05.120
Link: CVE-2021-36160
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN