A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.debian.org/security/2021/dsa-4982
https://security.netapp.com/advisory/ntap-20211008-0004/
https://security.gentoo.org/glsa/202208-20
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html