Bug 2176211 (CVE-2023-27522)

Summary: CVE-2023-27522 httpd: mod_proxy_uwsgi HTTP response splitting
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: asoldano, bbaranow, bdettelb, bmaxwell, brian.stansberry, caswilli, cdewolf, chazlett, csutherl, darran.lofthouse, dkreling, dosoudil, fjuma, hhorak, ivassile, iweiss, jburrell, jclere, jkoehler, jorton, jwakely, kaycoth, kyoshida, lgao, luhliari, micjohns, mosmerov, msochure, msvehla, mturk, nbhumkar, nobody, nwallace, pablomiguelcj, peholase, pjindal, plodge, pmackay, rstancel, ryan.brothers, smaestri, sthirugn, szappis, tom.jenkinson, xili, zac.carius
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: httpd 2.4.56 Doc Type: If docs needed, set a value
Doc Text:
An HTTP Response Smuggling vulnerability was found in the Apache HTTP Server via mod_proxy_uwsgi. This security issue occurs when special characters in the origin response header can truncate or split the response forwarded to the client.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-08-15 21:54:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2176720, 2176723, 2176724, 2236177, 2236178    
Bug Blocks: 2176202    

Description Mauro Matteo Cascella 2023-03-07 16:22:49 UTC
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.

References:
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.openwall.com/lists/oss-security/2023/03/07/2

Comment 2 Sandipan Roy 2023-03-09 04:15:37 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 2176720]

Comment 4 ryan.brothers 2023-05-09 14:51:10 UTC
Is there a timeline for when this will be patched in RHEL9?

Comment 5 Luboš Uhliarik 2023-05-25 15:38:14 UTC
We will probably fix it in the next RHEL-9 release.(In reply to ryan.brothers from comment #4)
> Is there a timeline for when this will be patched in RHEL9?

We will probably fix it in the next RHEL-9 release.

Comment 6 pablomiguelcj 2023-05-26 13:22:37 UTC
Hy,
for RHEL-8 there a RHSA to address the CVE-2023-27522 ?
thks

Comment 12 errata-xmlrpc 2023-08-15 17:37:15 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2023:4628 https://access.redhat.com/errata/RHSA-2023:4628

Comment 13 errata-xmlrpc 2023-08-15 17:40:49 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7
  JBoss Core Services for RHEL 8

Via RHSA-2023:4629 https://access.redhat.com/errata/RHSA-2023:4629

Comment 14 Product Security DevOps Team 2023-08-15 21:54:12 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-27522

Comment 15 errata-xmlrpc 2023-09-11 13:18:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:5049 https://access.redhat.com/errata/RHSA-2023:5049

Comment 16 errata-xmlrpc 2023-09-11 13:18:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:5050 https://access.redhat.com/errata/RHSA-2023:5050

Comment 17 Stefanie Norton 2023-10-05 09:28:16 UTC Comment hidden (spam)
Comment 18 errata-xmlrpc 2023-11-07 08:16:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6403 https://access.redhat.com/errata/RHSA-2023:6403

Comment 21 Rosie 2024-05-21 03:17:53 UTC Comment hidden (spam)
Comment 22 whoopigoldberg 2024-06-06 01:50:00 UTC Comment hidden (spam)
Comment 23 ktbqprdp9j 2024-07-10 06:01:44 UTC Comment hidden (spam)
Comment 24 errata-xmlrpc 2024-07-11 12:17:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:4504 https://access.redhat.com/errata/RHSA-2024:4504

Comment 25 rawove 2024-08-09 10:25:54 UTC Comment hidden (spam)
Comment 26 dexudu 2024-10-10 21:59:48 UTC Comment hidden (spam)
Comment 27 dexudu 2024-10-11 21:50:51 UTC Comment hidden (spam)
Comment 28 Block Blast Unblocked 2025-01-14 13:40:21 UTC Comment hidden (spam)
Comment 29 Block Blast Unblocked 2025-01-14 13:49:39 UTC Comment hidden (spam)
Comment 30 bitlife mod apk 2025-02-20 10:41:36 UTC Comment hidden (spam)
Comment 31 bitlife mod apk 2025-02-20 10:42:54 UTC Comment hidden (spam)
Comment 32 bitlife mod apk 2025-02-20 10:43:57 UTC Comment hidden (spam)
Comment 33 Flix vision APK 2025-02-25 09:31:30 UTC Comment hidden (spam)
Comment 34 Codocp 2025-05-12 18:07:08 UTC Comment hidden (spam)