{"id":"MGASA-2023-0100","summary":"Updated apache packages fix security vulnerability","details":"Some mod_proxy configurations on Apache HTTP Server allow a HTTP request\nsmuggling attack. Configurations are affected when mod_proxy is enabled\nalong with some form of RewriteRule or ProxyPassMatch in which a\nnon-specific pattern matches some portion of the user-supplied\nrequest-target (URL) data and is then re-inserted into the proxied\nrequest-target using variable substitution. (CVE-2023-25690)\nHTTP Response Smuggling vulnerability in Apache HTTP Server via\nmod_proxy_uwsgi. This issue affects Apache HTTP Server. Special\ncharacters in the origin response header can truncate/split the response\nforwarded to the client. (CVE-2023-27522)\n","modified":"2026-04-16T00:09:07.222691597Z","published":"2023-03-18T22:16:28Z","upstream":["CVE-2023-25690","CVE-2023-27522"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2023-0100.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=31644"},{"type":"WEB","url":"https://downloads.apache.org/httpd/CHANGES_2.4.56"}],"affected":[{"package":{"name":"apache","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/apache?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.56-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0100.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}