Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 866536 (CVE-2022-22728) - <www-apache/libapreq2-2.17: buffer overflow in multipart form uploads
Summary: <www-apache/libapreq2-2.17: buffer overflow in multipart form uploads
Status: IN_PROGRESS
Alias: CVE-2022-22728
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://lists.apache.org/thread/2fsjo...
Whiteboard: B3 [glsa cleanup]
Keywords:
Depends on: 877035
Blocks:
  Show dependency tree
 
Reported: 2022-08-25 15:06 UTC by John Helmert III
Modified: 2022-10-22 04:57 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-25 15:06:58 UTC
CVE-2022-22728:

A flaw in Apache libapreq2 versions 2.16 and earlier could cause a buffer overflow while processing multipart form uploads.  A remote attacker could send a request causing a process crash which could lead to a denial of service attack.

I guess this is all of the information available. I don't see any
newer version on Repology.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2022-08-27 07:10:42 UTC
From 2.17 release notes:

    3 
    4 @section v2_17 Changes with libapreq2-2.17 (released 25 August, 2022)
    5 
    6 - Multipart header parser [Yann Ylavic]
    7   Rework apreq_parse_headers() to discard CRLF of folded values.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-21 17:47:49 UTC
(In reply to Sam James from comment #1)
> From 2.17 release notes:
> 
>     3 
>     4 @section v2_17 Changes with libapreq2-2.17 (released 25 August, 2022)
>     5 
>     6 - Multipart header parser [Yann Ylavic]
>     7   Rework apreq_parse_headers() to discard CRLF of folded values.

Hm, are we sure this fixes the CVE? I asked on oss-security if there was a fixed version, and nobody responded:

https://www.openwall.com/lists/oss-security/2022/08/26/4

In any case, GLSA request filed.