CVE-2022-22721

NameCVE-2022-22721
DescriptionIf LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2960-1, ELA-585-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)jessie, jessie (lts)2.4.10-10+deb8u29fixed
stretch (security)2.4.25-3+deb9u13fixed
stretch (lts), stretch2.4.25-3+deb9u19fixed
buster, buster (lts)2.4.59-1~deb10u4fixed
buster (security)2.4.59-1~deb10u1fixed
bullseye2.4.62-1~deb11u1fixed
bullseye (security)2.4.62-1~deb11u2fixed
bookworm (security), bookworm2.4.62-1~deb12u2fixed
sid, trixie2.4.62-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2sourcejessie2.4.10-10+deb8u22ELA-585-1
apache2sourcestretch2.4.25-3+deb9u13DLA-2960-1
apache2sourcebuster2.4.38-3+deb10u8
apache2sourcebullseye2.4.53-1~deb11u1
apache2source(unstable)2.4.53-1

Notes

https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
Fixed by: https://svn.apache.org/r1898693

Search for package or bug name: Reporting problems