CVE-2015-0228

Publication date 16 February 2015

Last updated 24 July 2024


Ubuntu priority

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

Read the notes from the security team

Status

Package Ubuntu Release Status
apache2 14.10 utopic
Fixed 2.4.10-1ubuntu1.1
14.04 LTS trusty
Not affected
12.04 LTS precise
Not affected
10.04 LTS lucid
Not affected

Notes


mdeslaur

mod_lua is in 2.4.x only mod_lua isn't built in trusty

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
apache2

References

Related Ubuntu Security Notices (USN)

    • USN-2523-1
    • Apache HTTP Server vulnerabilities
    • 10 March 2015

Other references