Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 14 Mar 2022 19:10:44 +0000
From:      bugzilla-noreply@freebsd.org
To:        apache@FreeBSD.org
Subject:   [Bug 262557] [PATCH] www/apache24 - Update to 2.4.53 (Fix CVEs) see https://reviews.freebsd.org/D34549
Message-ID:  <bug-262557-16115-LlOQ0iVXyp@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-262557-16115@https.bugs.freebsd.org/bugzilla/>
References:  <bug-262557-16115@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D262557

--- Comment #3 from Cy Schubert <cy@FreeBSD.org> ---
Subject: CVE-2022-22719: Apache HTTP Server: mod_lua Use of uninitialized
 value of in r:parsebody=20
From: Stefan Eissing <icing@apache.org>
Date: Mon, 14 Mar 2022 10:09:26 +0000 (03:09 PDT)
To: announce@apache.org, dev@httpd.apache.org

        (text/plain)
(Unknown charset: <utf-8>)

Severity: moderate

Description:

A carefully crafted request body can cause a read to a random memory area w=
hich
could cause the process to crash.

This issue affects Apache HTTP Server 2.4.52 and earlier.

Credit:

Chamal De Silva

--=20
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-262557-16115-LlOQ0iVXyp>