{"id":"MGASA-2015-0099","summary":"Updated apache packages fix CVE-2015-0228","details":"Updated apache packages fix security vulnerability:\n\nIn the mod_lua module in the Apache HTTP Server through 2.4.10, a maliciously\ncrafted websockets PING after a script calls r:wsupgrade() can cause a child\nprocess crash (CVE-2015-0228).\n","modified":"2026-04-16T01:46:49.537714432Z","published":"2015-03-06T18:08:57Z","upstream":["CVE-2015-0228"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0099.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15428"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2015-03/msg00006.html"}],"affected":[{"package":{"name":"apache","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/apache?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.7-5.6.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0099.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}