CVE-2022-22721

NameCVE-2022-22721
DescriptionIf LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2960-1, ELA-585-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)jessie, jessie (lts)2.4.10-10+deb8u25fixed
stretch (security)2.4.25-3+deb9u13fixed
stretch (lts), stretch2.4.25-3+deb9u15fixed
buster2.4.38-3+deb10u8fixed
buster (security)2.4.38-3+deb10u10fixed
bullseye2.4.56-1~deb11u2fixed
bullseye (security)2.4.59-1~deb11u1fixed
bookworm2.4.57-2fixed
bookworm (security)2.4.59-1~deb12u1fixed
sid, trixie2.4.59-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2sourcejessie2.4.10-10+deb8u22ELA-585-1
apache2sourcestretch2.4.25-3+deb9u13DLA-2960-1
apache2sourcebuster2.4.38-3+deb10u8
apache2sourcebullseye2.4.53-1~deb11u1
apache2source(unstable)2.4.53-1

Notes

https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
Fixed by: https://svn.apache.org/r1898693

Search for package or bug name: Reporting problems