Hello,

CERT-FR considers three new Apache2 vulnerabilities to be of concern [1].

These are:

CVE-2022-37436 [2]
CVE-2022-36760 [3]
CVE-2006-20001 [4]

The first one will modify how clients may apply some security headers if a
malicious backend triggers this bug (some headers will be in the response
body). Ranke as 5.3 MEDIUM.

The second one is specific to mod_proxy_ajp, aka Java/tomcat backend.
Ranked as 9.0 CRITICAL.

The third one is a very old vulnerability in webdav, which is a read of one
byte or buffer head overflow of 1 byte. This is ranked as 7.5 / HIGH.

My personal ranks are: don't care (my backends are not malicious :->), don't
care (I don't run any Java software per policy). The last one bothers me more.

Do you know when this will be fixed in LTS?

The Security tracker [5] tells me that bullseye is not fixed yet either, and
the no-DSA bothers me.

Thank you for looking into this.

[1] https://www.cert.ssi.gouv.fr/avis/CERTFR-2023-AVI-0035/?s=09
[2] https://www.cve.org/CVERecord?id=CVE-2022-37436
[3] https://www.cve.org/CVERecord?id=CVE-2022-36760
[4] https://www.cve.org/CVERecord?id=CVE-2006-20001
[5] https://security-tracker.debian.org/tracker/source-package/apache2

Reply via email to