Mageia 2023-0123: libapreq2 security update
Summary
A flaw in Apache libapreq2 versions 2.16 and earlier could cause a buffer
overflow while processing multipart form uploads. A remote attacker could
send a request causing a process crash which could lead to a denial of
service attack. (CVE-2022-22728)
References
- https://bugs.mageia.org/show_bug.cgi?id=30778
- https://www.openwall.com/lists/oss-security/2022/08/25/3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/2PUUS3JL44UUSLJTSXE46HVKZIW7E7PE/
- https://www.openwall.com/lists/oss-security/2023/01/02/2
- https://www.debian.org/lts/security/2023/dla-3269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22728
Resolution
MGASA-2023-0123 - Updated libapreq2 packages fix security vulnerability
SRPMS
- 8/core/libapreq2-2.130.0-31.1.mga8