The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-33056 The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
Ubuntu USN Ubuntu USN USN-5487-1 Apache HTTP Server vulnerabilities
Ubuntu USN Ubuntu USN USN-5487-3 Apache HTTP Server regression
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T05:56:16.107Z

Reserved: 2022-04-04T00:00:00

Link: CVE-2022-28614

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-09T17:15:09.180

Modified: 2024-11-21T06:57:35.057

Link: CVE-2022-28614

cve-icon Redhat

Severity : Low

Publid Date: 2022-06-08T00:00:00Z

Links: CVE-2022-28614 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses