ap_escape_quotes() may write beyond the end of a buffer when given
malicious input. No included modules pass untrusted data to these
functions, but third-party / external modules may. This issue affects
Apache HTTP Server 2.4.48 and earlier.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | apache2 | < 2.4.29-1ubuntu4.17 | UNKNOWN |
ubuntu | 20.04 | noarch | apache2 | < 2.4.41-4ubuntu3.5 | UNKNOWN |
ubuntu | 21.04 | noarch | apache2 | < 2.4.46-4ubuntu1.2 | UNKNOWN |
ubuntu | 21.10 | noarch | apache2 | < 2.4.48-3.1ubuntu2 | UNKNOWN |
ubuntu | 22.04 | noarch | apache2 | < 2.4.48-3.1ubuntu2 | UNKNOWN |
ubuntu | 14.04 | noarch | apache2 | < 2.4.7-1ubuntu4.22+esm2 | UNKNOWN |
ubuntu | 16.04 | noarch | apache2 | < 2.4.18-2ubuntu3.17+esm2 | UNKNOWN |
httpd.apache.org/security/vulnerabilities_24.html
httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275
launchpad.net/bugs/cve/CVE-2021-39275
nvd.nist.gov/vuln/detail/CVE-2021-39275
security-tracker.debian.org/tracker/CVE-2021-39275
ubuntu.com/security/notices/USN-5090-1
ubuntu.com/security/notices/USN-5090-2
www.cve.org/CVERecord?id=CVE-2021-39275