httpd-2.4.53-7.el9
エラータID: AXSA:2023-4683:01
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the MIRACLE LINUX 9.1 Release Notes linked from the References section.
CVE-2022-22719
A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-22721
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-23943
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
CVE-2022-26377
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
CVE-2022-28614
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
CVE-2022-28615
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
CVE-2022-29404
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
CVE-2022-30522
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
CVE-2022-30556
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
CVE-2022-31813
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
Update packages.
A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
N/A
SRPMS
- httpd-2.4.53-7.el9.src.rpm
MD5: d63b120db2b0a963ed017d2383db70a9
SHA-256: ca28d1fbb0011856266e9d3deae1ab1ddd5897d4f5c439d4dcd1d49c64002552
Size: 7.56 MB
Asianux Server 9 for x86_64
- httpd-2.4.53-7.el9.x86_64.rpm
MD5: d1bcebcf9df652fee03375ec35f44612
SHA-256: 83cd870a845e40de4b3676027a43232f594a9c3a7c68bc7bac79fda3c6023e8d
Size: 47.61 kB - httpd-core-2.4.53-7.el9.x86_64.rpm
MD5: b7853e8b8415352f855b1b512190cea4
SHA-256: a8615225fa06d2e10ce59e9c1c23466bcbbf9de6c126ee0ca5fda36533085d43
Size: 1.35 MB - httpd-devel-2.4.53-7.el9.x86_64.rpm
MD5: 19400701d94daead655b826371424c97
SHA-256: c271b025305d529ccbe0654f4344b0cbb3188b135caedad93e0ca97ff28ea24c
Size: 192.70 kB - httpd-filesystem-2.4.53-7.el9.noarch.rpm
MD5: 9a9eebbd9c6c006255fd07e33b3bd778
SHA-256: 5331ddf75cfb7493f5d7d9818bc7fc3e3bf0d78cec04ec925e14f43386e0b508
Size: 14.49 kB - httpd-manual-2.4.53-7.el9.noarch.rpm
MD5: 8343a3343e436f9b3b4603043d2668e2
SHA-256: fa43df7c3cf546bc5aa510b448ef2641c145579f8e066583b7a6600b14a33e80
Size: 2.23 MB - httpd-tools-2.4.53-7.el9.x86_64.rpm
MD5: 9f7863b6703f33a63fdaa021e1b6a1ec
SHA-256: e8c83b8d74078cd36d16ffa2812f4c718d1bb8480aacaae890f5f9615bc8a3c7
Size: 81.98 kB - mod_ldap-2.4.53-7.el9.x86_64.rpm
MD5: d6859fbad03adfd5902165776ce8ad59
SHA-256: 4b13c8d1b0d49fdba719fca68ac805f5fbb368ecb8b560575bedc17cd320b587
Size: 62.48 kB - mod_lua-2.4.53-7.el9.x86_64.rpm
MD5: a1e35601f2d48decb12c9a2346c35f64
SHA-256: 4898c0b2b516c33de3cbbc6daee6eaf0bba1f5e637a307e5cc694b015808e57c
Size: 61.84 kB - mod_proxy_html-2.4.53-7.el9.x86_64.rpm
MD5: 675f20009e4f90eeb5a245f4cdb66d10
SHA-256: 7ff882659b7a76a4426150eb1ae6422312cd834d810b2f20a625f9b11a43c3e1
Size: 37.41 kB - mod_session-2.4.53-7.el9.x86_64.rpm
MD5: a85e57d3e4a7fda459b58b6f38bdb381
SHA-256: 26b3f784aa39414edfbfd54317ca445efaed8086351ec10789d6ae3996a2c2a9
Size: 49.29 kB - mod_ssl-2.4.53-7.el9.x86_64.rpm
MD5: eb48e2ff48f787cc671601fe4302ce4e
SHA-256: c72ef10f5d3a038511d7ddef161fefdcef78819c4a3a2336a89a622ba392dd9d
Size: 111.02 kB