<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2022:1031-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-03-29T15:35:03Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-03-29T15:35:03Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-03-29T15:35:03Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-SLE-15.3-2022-1031</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/</URL>
      <Description>E-Mail link for openSUSE-SU-2022:1031-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1197091</URL>
      <Description>SUSE Bug 1197091</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1197095</URL>
      <Description>SUSE Bug 1197095</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1197096</URL>
      <Description>SUSE Bug 1197096</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1197098</URL>
      <Description>SUSE Bug 1197098</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-22719/</URL>
      <Description>SUSE CVE CVE-2022-22719 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-22720/</URL>
      <Description>SUSE CVE CVE-2022-22720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-22721/</URL>
      <Description>SUSE CVE CVE-2022-22721 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-23943/</URL>
      <Description>SUSE CVE CVE-2022-23943 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.51-150200.3.42.1">
      <FullProductName ProductID="apache2-2.4.51-150200.3.42.1">apache2-2.4.51-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-devel-2.4.51-150200.3.42.1">
      <FullProductName ProductID="apache2-devel-2.4.51-150200.3.42.1">apache2-devel-2.4.51-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.4.51-150200.3.42.1">
      <FullProductName ProductID="apache2-doc-2.4.51-150200.3.42.1">apache2-doc-2.4.51-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-event-2.4.51-150200.3.42.1">
      <FullProductName ProductID="apache2-event-2.4.51-150200.3.42.1">apache2-event-2.4.51-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.4.51-150200.3.42.1">
      <FullProductName ProductID="apache2-example-pages-2.4.51-150200.3.42.1">apache2-example-pages-2.4.51-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.51-150200.3.42.1">
      <FullProductName ProductID="apache2-prefork-2.4.51-150200.3.42.1">apache2-prefork-2.4.51-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.51-150200.3.42.1">
      <FullProductName ProductID="apache2-utils-2.4.51-150200.3.42.1">apache2-utils-2.4.51-150200.3.42.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.51-150200.3.42.1">
      <FullProductName ProductID="apache2-worker-2.4.51-150200.3.42.1">apache2-worker-2.4.51-150200.3.42.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.51-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:apache2-2.4.51-150200.3.42.1">apache2-2.4.51-150200.3.42.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.51-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.42.1">apache2-devel-2.4.51-150200.3.42.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.51-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.42.1">apache2-doc-2.4.51-150200.3.42.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-event-2.4.51-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.42.1">apache2-event-2.4.51-150200.3.42.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.51-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.42.1">apache2-example-pages-2.4.51-150200.3.42.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.51-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.42.1">apache2-prefork-2.4.51-150200.3.42.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.51-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.42.1">apache2-utils-2.4.51-150200.3.42.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.51-150200.3.42.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.42.1">apache2-worker-2.4.51-150200.3.42.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.</Note>
    </Notes>
    <CVE>CVE-2022-22719</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:apache2-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-22719.html</URL>
        <Description>CVE-2022-22719</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197091</URL>
        <Description>SUSE Bug 1197091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198430</URL>
        <Description>SUSE Bug 1198430</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling</Note>
    </Notes>
    <CVE>CVE-2022-22720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:apache2-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-22720.html</URL>
        <Description>CVE-2022-22720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197095</URL>
        <Description>SUSE Bug 1197095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198430</URL>
        <Description>SUSE Bug 1198430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198998</URL>
        <Description>SUSE Bug 1198998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199102</URL>
        <Description>SUSE Bug 1199102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199495</URL>
        <Description>SUSE Bug 1199495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204730</URL>
        <Description>SUSE Bug 1204730</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.</Note>
    </Notes>
    <CVE>CVE-2022-22721</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:apache2-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-22721.html</URL>
        <Description>CVE-2022-22721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197096</URL>
        <Description>SUSE Bug 1197096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198430</URL>
        <Description>SUSE Bug 1198430</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.</Note>
    </Notes>
    <CVE>CVE-2022-23943</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:apache2-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-devel-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-doc-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-event-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-example-pages-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-prefork-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-utils-2.4.51-150200.3.42.1</ProductID>
        <ProductID>openSUSE Leap 15.3:apache2-worker-2.4.51-150200.3.42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-23943.html</URL>
        <Description>CVE-2022-23943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197098</URL>
        <Description>SUSE Bug 1197098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198430</URL>
        <Description>SUSE Bug 1198430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200351</URL>
        <Description>SUSE Bug 1200351</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
