Amazon Linux 2023 Security Advisory: ALAS-2023-115
Advisory Release Date: 2023-03-06 17:50 Pacific
Advisory Updated Date: 2023-03-08 00:51 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. (CVE-2006-20001)
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions. (CVE-2022-36760)
Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client. (CVE-2022-37436)
Affected Packages:
httpd
Issue Correction:
Run dnf update httpd --releasever=2023.0.20230308 to update your system.
aarch64:
mod_lua-debuginfo-2.4.55-1.amzn2023.aarch64
mod_session-debuginfo-2.4.55-1.amzn2023.aarch64
mod_ldap-2.4.55-1.amzn2023.aarch64
mod_ssl-debuginfo-2.4.55-1.amzn2023.aarch64
mod_session-2.4.55-1.amzn2023.aarch64
httpd-debugsource-2.4.55-1.amzn2023.aarch64
mod_ldap-debuginfo-2.4.55-1.amzn2023.aarch64
httpd-tools-2.4.55-1.amzn2023.aarch64
mod_lua-2.4.55-1.amzn2023.aarch64
httpd-tools-debuginfo-2.4.55-1.amzn2023.aarch64
httpd-debuginfo-2.4.55-1.amzn2023.aarch64
httpd-core-2.4.55-1.amzn2023.aarch64
httpd-devel-2.4.55-1.amzn2023.aarch64
httpd-2.4.55-1.amzn2023.aarch64
httpd-core-debuginfo-2.4.55-1.amzn2023.aarch64
mod_proxy_html-2.4.55-1.amzn2023.aarch64
mod_proxy_html-debuginfo-2.4.55-1.amzn2023.aarch64
mod_ssl-2.4.55-1.amzn2023.aarch64
noarch:
httpd-filesystem-2.4.55-1.amzn2023.noarch
httpd-manual-2.4.55-1.amzn2023.noarch
src:
httpd-2.4.55-1.amzn2023.src
x86_64:
mod_lua-debuginfo-2.4.55-1.amzn2023.x86_64
mod_session-debuginfo-2.4.55-1.amzn2023.x86_64
mod_proxy_html-debuginfo-2.4.55-1.amzn2023.x86_64
httpd-debugsource-2.4.55-1.amzn2023.x86_64
mod_ssl-debuginfo-2.4.55-1.amzn2023.x86_64
httpd-debuginfo-2.4.55-1.amzn2023.x86_64
mod_proxy_html-2.4.55-1.amzn2023.x86_64
httpd-core-debuginfo-2.4.55-1.amzn2023.x86_64
mod_ldap-2.4.55-1.amzn2023.x86_64
mod_lua-2.4.55-1.amzn2023.x86_64
httpd-tools-debuginfo-2.4.55-1.amzn2023.x86_64
httpd-2.4.55-1.amzn2023.x86_64
mod_ldap-debuginfo-2.4.55-1.amzn2023.x86_64
mod_session-2.4.55-1.amzn2023.x86_64
httpd-tools-2.4.55-1.amzn2023.x86_64
mod_ssl-2.4.55-1.amzn2023.x86_64
httpd-devel-2.4.55-1.amzn2023.x86_64
httpd-core-2.4.55-1.amzn2023.x86_64