Amazon Linux 2023 Security Advisory: ALAS-2023-072
Advisory Release Date: 2023-02-17 20:46 Pacific
Advisory Updated Date: 2023-02-22 23:31 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
There's a null pointer dereference and server-side request forgery flaw in httpd's mod_proxy module, when it is configured to be used as a forward proxy. A crafted packet could be sent on the adjacent network to the forward proxy that could cause a crash, or potentially SSRF via misdirected Unix Domain Socket requests. In the worst case, this could cause a denial of service or compromise to confidentiality of data. (CVE-2021-44224)
A buffer overflow flaw in httpd's lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability. (CVE-2021-44790)
A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest treat of this vulnerability is availability. (CVE-2022-22719)
A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling. (CVE-2022-22720)
A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write. (CVE-2022-22721)
An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker. (CVE-2022-23943)
An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests. (CVE-2022-26377)
An out-of-bounds read vulnerability was found in the mod_isapi module of httpd. The issue occurs when httpd is configured to process requests with the mod_isapi module. (CVE-2022-28330)
An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read. (CVE-2022-28614)
An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read. (CVE-2022-28615)
A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size. (CVE-2022-29404)
A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations. (CVE-2022-30522)
A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure. (CVE-2022-30556)
A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism. (CVE-2022-31813)
Affected Packages:
httpd
Issue Correction:
Run dnf update httpd --releasever=2023.0.20230222 to update your system.
aarch64:
httpd-debuginfo-2.4.54-3.amzn2023.0.4.aarch64
mod_lua-debuginfo-2.4.54-3.amzn2023.0.4.aarch64
mod_session-2.4.54-3.amzn2023.0.4.aarch64
mod_proxy_html-2.4.54-3.amzn2023.0.4.aarch64
mod_ldap-debuginfo-2.4.54-3.amzn2023.0.4.aarch64
httpd-debugsource-2.4.54-3.amzn2023.0.4.aarch64
httpd-tools-debuginfo-2.4.54-3.amzn2023.0.4.aarch64
httpd-2.4.54-3.amzn2023.0.4.aarch64
mod_proxy_html-debuginfo-2.4.54-3.amzn2023.0.4.aarch64
mod_ssl-2.4.54-3.amzn2023.0.4.aarch64
httpd-devel-2.4.54-3.amzn2023.0.4.aarch64
mod_ldap-2.4.54-3.amzn2023.0.4.aarch64
mod_session-debuginfo-2.4.54-3.amzn2023.0.4.aarch64
mod_lua-2.4.54-3.amzn2023.0.4.aarch64
httpd-tools-2.4.54-3.amzn2023.0.4.aarch64
mod_ssl-debuginfo-2.4.54-3.amzn2023.0.4.aarch64
httpd-core-2.4.54-3.amzn2023.0.4.aarch64
httpd-core-debuginfo-2.4.54-3.amzn2023.0.4.aarch64
noarch:
httpd-manual-2.4.54-3.amzn2023.0.4.noarch
httpd-filesystem-2.4.54-3.amzn2023.0.4.noarch
src:
httpd-2.4.54-3.amzn2023.0.4.src
x86_64:
mod_lua-debuginfo-2.4.54-3.amzn2023.0.4.x86_64
mod_session-debuginfo-2.4.54-3.amzn2023.0.4.x86_64
httpd-debugsource-2.4.54-3.amzn2023.0.4.x86_64
mod_proxy_html-debuginfo-2.4.54-3.amzn2023.0.4.x86_64
httpd-debuginfo-2.4.54-3.amzn2023.0.4.x86_64
mod_session-2.4.54-3.amzn2023.0.4.x86_64
httpd-2.4.54-3.amzn2023.0.4.x86_64
httpd-devel-2.4.54-3.amzn2023.0.4.x86_64
httpd-tools-2.4.54-3.amzn2023.0.4.x86_64
mod_ssl-2.4.54-3.amzn2023.0.4.x86_64
mod_ldap-debuginfo-2.4.54-3.amzn2023.0.4.x86_64
mod_lua-2.4.54-3.amzn2023.0.4.x86_64
mod_ssl-debuginfo-2.4.54-3.amzn2023.0.4.x86_64
mod_ldap-2.4.54-3.amzn2023.0.4.x86_64
httpd-tools-debuginfo-2.4.54-3.amzn2023.0.4.x86_64
httpd-core-debuginfo-2.4.54-3.amzn2023.0.4.x86_64
mod_proxy_html-2.4.54-3.amzn2023.0.4.x86_64
httpd-core-2.4.54-3.amzn2023.0.4.x86_64