Opened 2 years ago

Closed 2 years ago

#16232 closed enhancement (fixed)

httpd-2.4.53

Reported by: Bruce Dubbs Owned by: ken@…
Priority: elevated Milestone: 11.2
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version.

Change History (7)

comment:1 by Douglas R. Reno, 2 years ago

Owner: changed from blfs-book to Douglas R. Reno
Status: newassigned

comment:2 by Bruce Dubbs, 2 years ago

Owner: changed from Douglas R. Reno to Bruce Dubbs
Status: assignednew

comment:3 by Bruce Dubbs, 2 years ago

Status: newassigned

comment:4 by Bruce Dubbs, 2 years ago

Resolution: fixed
Status: assignedclosed

Fixed at commit 45bc955a300ecde8ebba1051e60e0a977423e486

Package updates.
    Update to imlib2-1.8.1.
    Update to stunnel-5.63.
    Update to httpd-2.4.53.
    Update to HTML-Parser-3.77 (Perl module).

comment:5 by ken@…, 2 years ago

Priority: normalelevated
Resolution: fixed
Status: closedreopened

Belatedly marking as elevated, based on advisories on oss-security:

CVE-2022-23943: Apache HTTP Server: mod_sed: Read/write beyond bounds Severity: important

Description:

Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data.

This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.

CVE-2022-22721: Apache HTTP Server: core: Possible buffer overflow with

very large or unlimited LimitXMLRequestBody

Severity: low

Description:

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes.

This issue affects Apache HTTP Server 2.4.52 and earlier.

CVE-2022-22720: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier Severity: important

Description:

Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling

CVE-2022-22719: Apache HTTP Server: mod_lua Use of uninitialized value of in r:parsebody Severity: moderate

Description:

A carefully crafted request body can cause a read to a random memory area which could cause the process to crash.

This issue affects Apache HTTP Server 2.4.52 and earlier.

comment:6 by ken@…, 2 years ago

Owner: changed from Bruce Dubbs to ken@…
Status: reopenednew

Reassigning to me for advisory.

comment:7 by ken@…, 2 years ago

Resolution: fixed
Status: newclosed

SA 11.1-013.

Note: See TracTickets for help on using tickets.