I am running Rocky 8.5 and apache 2.4.37. As an initial warning, I am a bit of a novice - I have got everything setup and my website is working A OK.
After a fruitful morning working through a PCI test I have managed to harden the server and pass almost all PCI tests bar one apache related CVE (CVE-2021-36160) which was resolved in 2.4.49.
I understand backporting is the preferred approach to resolving these issues BUT this CVE has no patch available. RH indicates no possible mitigation.
Is an upgrade to a later apache version (latest stable is 2.4.51) the next suitable step for a Rocky8.5 install? Otherwise I don’t see a way to overcome this issue?
As per RedHat assigned severity its impact is Moderate only. So I suspect they will take time to release its update etc.
I will suggest if you are not using this UWSGI gateway module functionality ( mod_proxy_uwsgi ) unload it from loaded modules. ( comment it in /etc/httpd/conf.modules.d/00-proxy.conf )
“Affected” means that our Analysis Team has determined that this product is affected by this vulnerability and might release a fix to address this in the near future.
I’d rather wait for RH to fix than turn my system into unmanageable chimera. Do you even use that mod_proxy_uwsgi in your site?
Thanks guys, your input is much appreciated. I am not aware of any use of this module so I will unload it and monitor the site.
Extra points for the use of the word chimera!
Paul
Update: as it turns out the server didn’t even have he module loaded. Thanks again.
[root@li1250]# yum info mod_proxy_uwsgi
Last metadata expiration check: 3:52:19 ago on Mon 22 Nov 2021 03:16:43 AM EST.
Error: No matching Packages to list
Red Hat have loaded lot of apache modules in default config. If want further tunning unload all non required module. apachectl -M will give you the details of all loaded modules.