Two vulnerabilities have been discovered in the Apache HTTP server: CVE-2021-44224 When operating as a forward proxy, Apache was depending on the setup suspectible to denial of service or Server Side Request forgery. CVE-2021-44790 A buffer overflow in mod_lua may result in denial of service or potentially the execution of arbitrary code. For the oldstable distribution (buster), these problems have been fixed in version 2.4.38-3+deb10u7. For the stable distribution (bullseye), these problems have been fixed in version 2.4.52-1~deb11u2. We recommend that you upgrade your apache2 packages. For the detailed security status of apache2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/apache2
Two vulnerabilities have been discovered in the Apache HTTP server:
When operating as a forward proxy, Apache was depending on the setup suspectible to denial of service or Server Side Request forgery.
A buffer overflow in mod_lua may result in denial of service or potentially the execution of arbitrary code.
For the oldstable distribution (buster), these problems have been fixed in version 2.4.38-3+deb10u7.
For the stable distribution (bullseye), these problems have been fixed in version 2.4.52-1~deb11u2.
We recommend that you upgrade your apache2 packages.
For the detailed security status of apache2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/apache2