ALAS-2022-1584


Amazon Linux 1 Security Advisory: ALAS-2022-1584
Advisory Release Date: 2022-04-26 17:12 Pacific
Advisory Updated Date: 2022-04-28 21:44 Pacific
Severity: Important

Issue Overview:

A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest treat of this vulnerability is availability. (CVE-2022-22719)

A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling. (CVE-2022-22720)

A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write. (CVE-2022-22721)

An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker. (CVE-2022-23943)


Affected Packages:

httpd24


Issue Correction:
Run yum update httpd24 to update your system.

New Packages:
i686:
    mod24_ssl-2.4.53-1.96.amzn1.i686
    mod24_session-2.4.53-1.96.amzn1.i686
    httpd24-devel-2.4.53-1.96.amzn1.i686
    mod24_md-2.4.53-1.96.amzn1.i686
    httpd24-tools-2.4.53-1.96.amzn1.i686
    mod24_ldap-2.4.53-1.96.amzn1.i686
    httpd24-debuginfo-2.4.53-1.96.amzn1.i686
    httpd24-2.4.53-1.96.amzn1.i686
    mod24_proxy_html-2.4.53-1.96.amzn1.i686

noarch:
    httpd24-manual-2.4.53-1.96.amzn1.noarch

src:
    httpd24-2.4.53-1.96.amzn1.src

x86_64:
    mod24_session-2.4.53-1.96.amzn1.x86_64
    httpd24-debuginfo-2.4.53-1.96.amzn1.x86_64
    httpd24-devel-2.4.53-1.96.amzn1.x86_64
    httpd24-2.4.53-1.96.amzn1.x86_64
    mod24_ldap-2.4.53-1.96.amzn1.x86_64
    httpd24-tools-2.4.53-1.96.amzn1.x86_64
    mod24_proxy_html-2.4.53-1.96.amzn1.x86_64
    mod24_md-2.4.53-1.96.amzn1.x86_64
    mod24_ssl-2.4.53-1.96.amzn1.x86_64