CVE Vulnerabilities

CVE-2022-30522

Memory Allocation with Excessive Size Value

Published: Jun 09, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.

Weakness

The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.

Affected Software

NameVendorStart VersionEnd Version
Http_serverApache2.4.53 (including)2.4.53 (including)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-httpd-0:2.4.51-37.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.51-37.el7jbcs*
Red Hat Enterprise Linux 8RedHathttpd:2.4-8070020220725152258.3b9f49c4*
Red Hat Enterprise Linux 9RedHathttpd-0:2.4.53-7.el9*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHathttpd24-httpd-0:2.4.34-23.el7.5*
Text-Only JBCSRedHat*
Apache2Ubuntubionic*
Apache2Ubuntudevel*
Apache2Ubuntuesm-infra-legacy/trusty*
Apache2Ubuntuesm-infra/bionic*
Apache2Ubuntuesm-infra/focal*
Apache2Ubuntuesm-infra/xenial*
Apache2Ubuntufocal*
Apache2Ubuntuimpish*
Apache2Ubuntujammy*
Apache2Ubuntukinetic*
Apache2Ubuntutrusty/esm*
Apache2Ubuntuupstream*

Potential Mitigations

References