Oval Definition:oval:com.redhat.rhsa:def:20228067
Revision Date:2022-11-15Version:636
Title:RHSA-2022:8067: httpd security, bug fix, and enhancement update (Moderate)
Description:The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

  • The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)

    Security Fix(es):

  • httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)

  • httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)

  • httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)

  • httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)

  • httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)

  • httpd: mod_sed: DoS vulnerability (CVE-2022-30522)

  • httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)

  • httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)

  • httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)

  • httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

    Additional Changes:

    For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2022-22719
    CVE-2022-22721
    CVE-2022-23943
    CVE-2022-26377
    CVE-2022-28614
    CVE-2022-28615
    CVE-2022-29404
    CVE-2022-30522
    CVE-2022-30556
    CVE-2022-31813
    RHSA-2022:8067
    Platform(s):Red Hat Enterprise Linux 9
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 9 is installed
  • AND
  • httpd is earlier than 0:2.4.53-7.el9
  • AND httpd is signed with Red Hat redhatrelease2 key
  • httpd-core is earlier than 0:2.4.53-7.el9
  • AND httpd-core is signed with Red Hat redhatrelease2 key
  • httpd-devel is earlier than 0:2.4.53-7.el9
  • AND httpd-devel is signed with Red Hat redhatrelease2 key
  • httpd-filesystem is earlier than 0:2.4.53-7.el9
  • AND httpd-filesystem is signed with Red Hat redhatrelease2 key
  • httpd-manual is earlier than 0:2.4.53-7.el9
  • AND httpd-manual is signed with Red Hat redhatrelease2 key
  • httpd-tools is earlier than 0:2.4.53-7.el9
  • AND httpd-tools is signed with Red Hat redhatrelease2 key
  • mod_ldap is earlier than 0:2.4.53-7.el9
  • AND mod_ldap is signed with Red Hat redhatrelease2 key
  • mod_lua is earlier than 0:2.4.53-7.el9
  • AND mod_lua is signed with Red Hat redhatrelease2 key
  • mod_proxy_html is earlier than 1:2.4.53-7.el9
  • AND mod_proxy_html is signed with Red Hat redhatrelease2 key
  • mod_session is earlier than 0:2.4.53-7.el9
  • AND mod_session is signed with Red Hat redhatrelease2 key
  • mod_ssl is earlier than 1:2.4.53-7.el9
  • AND mod_ssl is signed with Red Hat redhatrelease2 key
  • BACK