httpd-2.4.53-7.el9

エラータID: AXSA:2023-4683:01

Release date: 
Thursday, January 12, 2023 - 04:22
Subject: 
httpd-2.4.53-7.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)

Security Fix(es):

* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the MIRACLE LINUX 9.1 Release Notes linked from the References section.

CVE-2022-22719
A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-22721
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-23943
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
CVE-2022-26377
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
CVE-2022-28614
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
CVE-2022-28615
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
CVE-2022-29404
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
CVE-2022-30522
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
CVE-2022-30556
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
CVE-2022-31813
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. httpd-2.4.53-7.el9.src.rpm
    MD5: d63b120db2b0a963ed017d2383db70a9
    SHA-256: ca28d1fbb0011856266e9d3deae1ab1ddd5897d4f5c439d4dcd1d49c64002552
    Size: 7.56 MB

Asianux Server 9 for x86_64
  1. httpd-2.4.53-7.el9.x86_64.rpm
    MD5: d1bcebcf9df652fee03375ec35f44612
    SHA-256: 83cd870a845e40de4b3676027a43232f594a9c3a7c68bc7bac79fda3c6023e8d
    Size: 47.61 kB
  2. httpd-core-2.4.53-7.el9.x86_64.rpm
    MD5: b7853e8b8415352f855b1b512190cea4
    SHA-256: a8615225fa06d2e10ce59e9c1c23466bcbbf9de6c126ee0ca5fda36533085d43
    Size: 1.35 MB
  3. httpd-devel-2.4.53-7.el9.x86_64.rpm
    MD5: 19400701d94daead655b826371424c97
    SHA-256: c271b025305d529ccbe0654f4344b0cbb3188b135caedad93e0ca97ff28ea24c
    Size: 192.70 kB
  4. httpd-filesystem-2.4.53-7.el9.noarch.rpm
    MD5: 9a9eebbd9c6c006255fd07e33b3bd778
    SHA-256: 5331ddf75cfb7493f5d7d9818bc7fc3e3bf0d78cec04ec925e14f43386e0b508
    Size: 14.49 kB
  5. httpd-manual-2.4.53-7.el9.noarch.rpm
    MD5: 8343a3343e436f9b3b4603043d2668e2
    SHA-256: fa43df7c3cf546bc5aa510b448ef2641c145579f8e066583b7a6600b14a33e80
    Size: 2.23 MB
  6. httpd-tools-2.4.53-7.el9.x86_64.rpm
    MD5: 9f7863b6703f33a63fdaa021e1b6a1ec
    SHA-256: e8c83b8d74078cd36d16ffa2812f4c718d1bb8480aacaae890f5f9615bc8a3c7
    Size: 81.98 kB
  7. mod_ldap-2.4.53-7.el9.x86_64.rpm
    MD5: d6859fbad03adfd5902165776ce8ad59
    SHA-256: 4b13c8d1b0d49fdba719fca68ac805f5fbb368ecb8b560575bedc17cd320b587
    Size: 62.48 kB
  8. mod_lua-2.4.53-7.el9.x86_64.rpm
    MD5: a1e35601f2d48decb12c9a2346c35f64
    SHA-256: 4898c0b2b516c33de3cbbc6daee6eaf0bba1f5e637a307e5cc694b015808e57c
    Size: 61.84 kB
  9. mod_proxy_html-2.4.53-7.el9.x86_64.rpm
    MD5: 675f20009e4f90eeb5a245f4cdb66d10
    SHA-256: 7ff882659b7a76a4426150eb1ae6422312cd834d810b2f20a625f9b11a43c3e1
    Size: 37.41 kB
  10. mod_session-2.4.53-7.el9.x86_64.rpm
    MD5: a85e57d3e4a7fda459b58b6f38bdb381
    SHA-256: 26b3f784aa39414edfbfd54317ca445efaed8086351ec10789d6ae3996a2c2a9
    Size: 49.29 kB
  11. mod_ssl-2.4.53-7.el9.x86_64.rpm
    MD5: eb48e2ff48f787cc671601fe4302ce4e
    SHA-256: c72ef10f5d3a038511d7ddef161fefdcef78819c4a3a2336a89a622ba392dd9d
    Size: 111.02 kB