Bug 2161773 (CVE-2022-37436)
Summary: | CVE-2022-37436 httpd: mod_proxy: HTTP response splitting | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Zack Miele <zmiele> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | asoldano, bbaranow, bdettelb, bmaxwell, brian.stansberry, caswilli, cdewolf, chazlett, csutherl, darran.lofthouse, dkreling, dosoudil, fjuma, hhorak, icesalov, ivassile, iweiss, jburrell, jclere, jkoehler, jorton, jwon, kaycoth, lgao, luhliari, micjohns, mosmerov, msochure, msvehla, mturk, nwallace, peholase, pjindal, plodge, pmackay, rstancel, smaestri, sthirugn, szappis, tom.jenkinson |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | httpd 2.4.55 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the mod_proxy module of httpd. A malicious backend can cause the response headers to be truncated because they are not cleaned when an error is found while reading them, resulting in some headers being incorporated into the response body and not being interpreted by a client.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-02-28 12:18:12 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2162094, 2162485, 2162486, 2162487, 2165973, 2165977 | ||
Bug Blocks: | 2161771 |
Description
Zack Miele
2023-01-17 20:50:26 UTC
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 2162094] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0852 https://access.redhat.com/errata/RHSA-2023:0852 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0970 https://access.redhat.com/errata/RHSA-2023:0970 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-37436 This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2023:4628 https://access.redhat.com/errata/RHSA-2023:4628 This issue has been addressed in the following products: JBoss Core Services on RHEL 7 JBoss Core Services for RHEL 8 Via RHSA-2023:4629 https://access.redhat.com/errata/RHSA-2023:4629 |