[Git][security-tracker-team/security-tracker][master] Update information on CVE-2020-11984 and add uwsgi

Salvatore Bonaccorso carnil at debian.org
Sat Aug 29 16:30:48 BST 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
66bbaf69 by Salvatore Bonaccorso at 2020-08-29T17:29:59+02:00
Update information on CVE-2020-11984 and add uwsgi

uwsgi embedds apache2/mod_proxy_uwsgi.c which has the issue. But since
2.0.15-11 the source does not build anymore
libapache2-mod-proxy-uwsgi{,-dbg} as they are provided by src:apache2
itself.

Mark the issue with unimportant severity for uwsgi as the vulnerable
code is not anymore shipped in a binary package. Due to global aspect of
the unimportant severity this means that the package moves as whole to
the open but unimportant issues.

A subset of supported suites still would be affected by the issue
directly, such as stretch which ship libapache2-mod-proxy-uwsgi based on
2.0.14+20161117-3 earlier than the move.

libapache2-mod-proxy-uwsgi is provided by src:apache2 thus in sid,
bullseye, buster, and from src:uwsgi for stretch (and older).

Thanks Utkarsh Gupta for hinting towards uwsgi.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -28629,10 +28629,13 @@ CVE-2020-11985 (IP address spoofing when proxying using mod_remoteip and mod_rew
 	NOTE: https://github.com/apache/httpd/commit/dd6c959b3625048ee15ba4ad72e6cb7bcaf91020
 CVE-2020-11984 (Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure an ...)
 	- apache2 2.4.46-1
+	- uwsgi <unfixed> (unimportant)
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11984
 	NOTE: https://www.openwall.com/lists/oss-security/2020/08/07/1
 	NOTE: https://svn.apache.org/r1880251
 	NOTE: https://github.com/apache/httpd/commit/0c543e3f5b3881d515d6235f152aacaaaf3aba72
+	NOTE: uwsgi since 2.0.15-11 drops building the libapache2-mod-proxy-uwsgi{,-dbg}
+	NOTE: packages which are provided by src:apache2 itself.
 CVE-2020-11983 (An issue was found in Apache Airflow versions 1.10.10 and below. It wa ...)
 	- airflow <itp> (bug #819700)
 CVE-2020-11982 (An issue was found in Apache Airflow versions 1.10.10 and below. When  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66bbaf692d5207562095ab7a6a6b12bd0d7d0894

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66bbaf692d5207562095ab7a6a6b12bd0d7d0894
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200829/de04b10a/attachment.html>


More information about the debian-security-tracker-commits mailing list