-
Notifications
You must be signed in to change notification settings - Fork 691
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[security] CVE-2023-27522 #2538
Comments
Thanks for the patch, any chance you can open a pull request? |
Hi, is there a plan to fix this bug? When will it be solved? |
xrmx
pushed a commit
to xrmx/uwsgi
that referenced
this issue
Jul 25, 2023
…ation HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. Special characters in the origin response header can truncate/split the response forwarded to the client. Fix unbit#2538 origin: https://github.com/apache/httpd/commit/d753ea76b5972a85349b68c31b59d04c60014f2d.patch bug-cve: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
xrmx
pushed a commit
to xrmx/uwsgi
that referenced
this issue
Jul 25, 2023
…ation HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. Special characters in the origin response header can truncate/split the response forwarded to the client. Fix unbit#2538 origin: https://github.com/apache/httpd/commit/d753ea76b5972a85349b68c31b59d04c60014f2d.patch bug-cve: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi,
You are affected by CVE-2023-27522
Patch backported from apache2 here:
Applied by freexian https://www.freexian.com/lts/extended/updates/ela-851-1-uwsgi/
The text was updated successfully, but these errors were encountered: