openSUSE: 2022:1031-1 important: apache2
Description
This update for apache2 fixes the following issues: - CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098). - CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095). - CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091). - CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1031=1
Package List
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): apache2-2.4.51-150200.3.42.1 apache2-debuginfo-2.4.51-150200.3.42.1 apache2-debugsource-2.4.51-150200.3.42.1 apache2-devel-2.4.51-150200.3.42.1 apache2-event-2.4.51-150200.3.42.1 apache2-event-debuginfo-2.4.51-150200.3.42.1 apache2-example-pages-2.4.51-150200.3.42.1 apache2-prefork-2.4.51-150200.3.42.1 apache2-prefork-debuginfo-2.4.51-150200.3.42.1 apache2-utils-2.4.51-150200.3.42.1 apache2-utils-debuginfo-2.4.51-150200.3.42.1 apache2-worker-2.4.51-150200.3.42.1 apache2-worker-debuginfo-2.4.51-150200.3.42.1 - openSUSE Leap 15.3 (noarch): apache2-doc-2.4.51-150200.3.42.1
References
https://www.suse.com/security/cve/CVE-2022-22719.html https://www.suse.com/security/cve/CVE-2022-22720.html https://www.suse.com/security/cve/CVE-2022-22721.html https://www.suse.com/security/cve/CVE-2022-23943.html https://bugzilla.suse.com/1197091 https://bugzilla.suse.com/1197095 https://bugzilla.suse.com/1197096 https://bugzilla.suse.com/1197098