[Git][security-tracker-team/security-tracker][master] Update information on CVE-2020-11984 and add uwsgi
Salvatore Bonaccorso
carnil at debian.org
Sat Aug 29 16:30:48 BST 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
66bbaf69 by Salvatore Bonaccorso at 2020-08-29T17:29:59+02:00
Update information on CVE-2020-11984 and add uwsgi
uwsgi embedds apache2/mod_proxy_uwsgi.c which has the issue. But since
2.0.15-11 the source does not build anymore
libapache2-mod-proxy-uwsgi{,-dbg} as they are provided by src:apache2
itself.
Mark the issue with unimportant severity for uwsgi as the vulnerable
code is not anymore shipped in a binary package. Due to global aspect of
the unimportant severity this means that the package moves as whole to
the open but unimportant issues.
A subset of supported suites still would be affected by the issue
directly, such as stretch which ship libapache2-mod-proxy-uwsgi based on
2.0.14+20161117-3 earlier than the move.
libapache2-mod-proxy-uwsgi is provided by src:apache2 thus in sid,
bullseye, buster, and from src:uwsgi for stretch (and older).
Thanks Utkarsh Gupta for hinting towards uwsgi.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -28629,10 +28629,13 @@ CVE-2020-11985 (IP address spoofing when proxying using mod_remoteip and mod_rew
NOTE: https://github.com/apache/httpd/commit/dd6c959b3625048ee15ba4ad72e6cb7bcaf91020
CVE-2020-11984 (Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure an ...)
- apache2 2.4.46-1
+ - uwsgi <unfixed> (unimportant)
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11984
NOTE: https://www.openwall.com/lists/oss-security/2020/08/07/1
NOTE: https://svn.apache.org/r1880251
NOTE: https://github.com/apache/httpd/commit/0c543e3f5b3881d515d6235f152aacaaaf3aba72
+ NOTE: uwsgi since 2.0.15-11 drops building the libapache2-mod-proxy-uwsgi{,-dbg}
+ NOTE: packages which are provided by src:apache2 itself.
CVE-2020-11983 (An issue was found in Apache Airflow versions 1.10.10 and below. It wa ...)
- airflow <itp> (bug #819700)
CVE-2020-11982 (An issue was found in Apache Airflow versions 1.10.10 and below. When ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66bbaf692d5207562095ab7a6a6b12bd0d7d0894
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66bbaf692d5207562095ab7a6a6b12bd0d7d0894
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200829/de04b10a/attachment.html>
More information about the debian-security-tracker-commits
mailing list