Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:0928-1

Опубликовано: 21 мар. 2022
Источник: suse-cvrf

Описание

Security update for apache2

This update for apache2 fixes the following issues:

  • CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
  • CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
  • CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
  • CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).

Also TLS 1.3 support and openssl 1.1.1 usage was disabled again as it caused regressions in various usage scenarios due to the combination between openssl 1.0.2 and 1.1.1 linkage without correct symbol versions by other libraries / tools. (bsc#1197301 bsc#1197177 bsc#1196249)

Список пакетов

SUSE Linux Enterprise Server 12 SP5
apache2-2.4.51-35.13.1
apache2-doc-2.4.51-35.13.1
apache2-example-pages-2.4.51-35.13.1
apache2-prefork-2.4.51-35.13.1
apache2-utils-2.4.51-35.13.1
apache2-worker-2.4.51-35.13.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
apache2-2.4.51-35.13.1
apache2-doc-2.4.51-35.13.1
apache2-example-pages-2.4.51-35.13.1
apache2-prefork-2.4.51-35.13.1
apache2-utils-2.4.51-35.13.1
apache2-worker-2.4.51-35.13.1
SUSE Linux Enterprise Software Development Kit 12 SP5
apache2-devel-2.4.51-35.13.1

Описание

A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.13.1

Ссылки

Описание

Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.13.1

Ссылки

Описание

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.13.1

Ссылки

Описание

Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.13.1
SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.13.1

Ссылки
Уязвимость SUSE-SU-2022:0928-1