httpd:2.4 security update

エラータID: AXSA:2022-4399:01

Release date: 
Tuesday, December 13, 2022 - 04:32
Subject: 
httpd:2.4 security update
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-22719
A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-22721
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-23943
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
CVE-2022-26377
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
CVE-2022-28614
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
CVE-2022-28615
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
CVE-2022-29404
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
CVE-2022-30522
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
CVE-2022-30556
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
CVE-2022-31813
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

Modularity name: httpd
Stream name: 2.4

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. httpd-2.4.37-51.module+el8+1548+a2ac2845.ML.1.src.rpm
    MD5: 96bdeb8431c3d10d6b8ee55924d71b10
    SHA-256: 473d529f9e315d9460ce3226a4a9f3022184fcc3b5bd227d0c1490081716e029
    Size: 6.94 MB
  2. mod_http2-1.15.7-5.module+el8+1548+a2ac2845.src.rpm
    MD5: 63d7dccb8c8a058b83a8788359474d93
    SHA-256: 27895efa8a098c367ceefc6027e7ac71b0bfad7ebe03e03b6a87cfafac0a6038
    Size: 1.01 MB
  3. mod_md-2.0.8-8.module+el8+1548+a2ac2845.src.rpm
    MD5: 1d6dcd9760f95f70928e84469a141bc7
    SHA-256: 491823c9634ca6436a934bcd583c8f38360180df9251eca6e40f2be69dd1f949
    Size: 635.32 kB

Asianux Server 8 for x86_64
  1. httpd-2.4.37-51.module+el8+1548+a2ac2845.ML.1.x86_64.rpm
    MD5: 59ab22186a6708ae50ae9eca84965b9f
    SHA-256: 25921b07984b167a8ef2cc9aad2b20b4e91b497db65f4c665e084508c9eb79dd
    Size: 1.41 MB
  2. httpd-debugsource-2.4.37-51.module+el8+1548+a2ac2845.ML.1.x86_64.rpm
    MD5: 93e8b04113be6cb80a47488cf9df9522
    SHA-256: 317a90108829ce86c1c3bfab8cc76ec993006d39037a4e7fbc64d68e5762557d
    Size: 1.45 MB
  3. httpd-devel-2.4.37-51.module+el8+1548+a2ac2845.ML.1.x86_64.rpm
    MD5: 57842d9093dc226ecf084225679f6d78
    SHA-256: df151c08f2f296b2bf39f66d3065791bc9137296e72a83b02b66ad2209f7f4ac
    Size: 224.24 kB
  4. httpd-filesystem-2.4.37-51.module+el8+1548+a2ac2845.ML.1.noarch.rpm
    MD5: 93b8130c7d5ff93e074f30c4c0f13473
    SHA-256: 447104535aec8c8711cf041eaae19ef9ba415fb9370f9ded0fe9c3d3812e9421
    Size: 41.07 kB
  5. httpd-manual-2.4.37-51.module+el8+1548+a2ac2845.ML.1.noarch.rpm
    MD5: 84d9306294babdf6d0699b4696e3b1b2
    SHA-256: 1e31746eec2a5c098e35967e0aff11263c9d7833f7bb23e1e8d7507c6b9e47dd
    Size: 2.38 MB
  6. httpd-tools-2.4.37-51.module+el8+1548+a2ac2845.ML.1.x86_64.rpm
    MD5: e321dad60499adad9f0e0d92ddf88947
    SHA-256: 357c11b3a7044aef5bc87dbecd85f8f8d0830a3addfbcccfbaa3bf891bf4145e
    Size: 108.14 kB
  7. mod_ldap-2.4.37-51.module+el8+1548+a2ac2845.ML.1.x86_64.rpm
    MD5: b95b7f36fb525f80e4e562dd51a9d734
    SHA-256: 46536290618d7897291e2cebe5a98b74dbe1184a0218df2bec48d6cfe2dda955
    Size: 86.39 kB
  8. mod_proxy_html-2.4.37-51.module+el8+1548+a2ac2845.ML.1.x86_64.rpm
    MD5: 1c411eef680b20da5d61e12271e92297
    SHA-256: 2887aa5a5dfbb8f138e1200a47eadc59ea8377a466e4535b0aea8c5923ae32e9
    Size: 63.50 kB
  9. mod_session-2.4.37-51.module+el8+1548+a2ac2845.ML.1.x86_64.rpm
    MD5: 3d0524ceda3bffb03fb33ee117089c5e
    SHA-256: 3c563bb246d792aac86a2e79c2e13d1a7ed3795708aed0984add4db8521a9f84
    Size: 75.17 kB
  10. mod_ssl-2.4.37-51.module+el8+1548+a2ac2845.ML.1.x86_64.rpm
    MD5: 9eb9e4e28b2e0d8ec08cb775795245a7
    SHA-256: 6482cc04386db34d2d518a8a131d9bddac12566dcf7eecc039ed5ba9159a8bd0
    Size: 137.71 kB
  11. mod_http2-1.15.7-5.module+el8+1548+a2ac2845.x86_64.rpm
    MD5: ac73b46381327228fdc8a1531659535c
    SHA-256: 3c0585c926c9dabf7b4091f38925a0779ec3e0c6be0bd5872fd8d66ed9fb4ca1
    Size: 153.28 kB
  12. mod_http2-debugsource-1.15.7-5.module+el8+1548+a2ac2845.x86_64.rpm
    MD5: eee0b287ffc49a6bbe274846b40c9389
    SHA-256: 673ce52baca2d26d941aa36f0aa5f021d570efd0632df9ead853ddfb818dadf7
    Size: 146.76 kB
  13. mod_md-2.0.8-8.module+el8+1548+a2ac2845.x86_64.rpm
    MD5: c8dc739a3ea43c37a43754d63749c34a
    SHA-256: 716b7275d4f5065b3909da27854427e0bcab55bff032599bf345a9261b005853
    Size: 183.60 kB
  14. mod_md-debugsource-2.0.8-8.module+el8+1548+a2ac2845.x86_64.rpm
    MD5: f85ffaedb87e8467014d51f743385eff
    SHA-256: cb4e56ccdea56fbe2ff470896e03dc04e09c99eac7e93de194631a5fce749584
    Size: 126.24 kB