First published: Wed Jun 08 2022(Updated: )
A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.54 | 2.4.54 |
redhat/httpd | <0:2.4.53-7.el9 | 0:2.4.53-7.el9 |
redhat/httpd24-httpd | <0:2.4.34-23.el7.5 | 0:2.4.34-23.el7.5 |
Apache HTTP server | <=2.4.53 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
NetApp Clustered Data ONTAP |
Disabling mod_lua and restarting httpd will mitigate this flaw.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-29404 is a vulnerability in Apache HTTP Server 2.4.53 and earlier that can result in a denial of service due to a lack of input size limit.
CVE-2022-29404 affects Apache HTTP Server versions 2.4.53 and earlier.
CVE-2022-29404 has a severity rating of high with a severity value of 7.
To fix CVE-2022-29404, update Apache HTTP Server to version 2.4.54 or later.
You can find more information about CVE-2022-29404 at the following references: [CVE-2022-29404](https://www.cve.org/CVERecord?id=CVE-2022-29404), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-29404), [Apache HTTP Server Security Vulnerabilities](https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2095012), and [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2022:7647).