CVE-2022-26377: Apache HTTP Server: mod_proxy_ajp: Possible request smuggling CVE-2022-28330: Apache HTTP Server: read beyond bounds in mod_isapi CVE-2022-28614: Apache HTTP Server: read beyond bounds via ap_rwrite() CVE-2022-29404: Apache HTTP Server: Denial of service in mod_lua r:parsebody CVE-2022-30522: Apache HTTP Server: mod_sed denial of service CVE-2022-30556: Apache HTTP Server: Information Disclosure in mod_lua with websockets CVE-2022-31813: Apache HTTP Server: mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism CVE-2022-28615: Apache HTTP Server: Read beyond bounds in ap_strcmp_match() Please stabilize 2.4.54 when ready.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=7809350d99ef042a9f97a7a6edcb9ca5c28db476 commit 7809350d99ef042a9f97a7a6edcb9ca5c28db476 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2022-08-14 00:09:33 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2022-08-14 00:11:42 +0000 [ GLSA 202208-20 ] Apache HTTPD: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/813429 Bug: https://bugs.gentoo.org/816399 Bug: https://bugs.gentoo.org/816864 Bug: https://bugs.gentoo.org/829722 Bug: https://bugs.gentoo.org/835131 Bug: https://bugs.gentoo.org/850622 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: John Helmert III <ajak@gentoo.org> glsa-202208-20.xml | 78 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 78 insertions(+)
Tree is clean, GLSA released, all done!