Updated: 2025-08-20 02:04:22.023775
Description:
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | MEDIUM | 5.0 |
| CVSS Version 3.x | MEDIUM | 5.3 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | httpd | 2.4.53 | 5.3 | MEDIUM | Ignored | 2023-11-08 04:08:00 | Deprioritize: Exploitation requires a module or script that explicitly reflects attacker-controlled ... | |
| CentOS 6 ELS | httpd | 2.2.15 | 5.3 | MEDIUM | Released | CLSA-2022:1663591920 | 2022-10-03 08:05:56 | |
| CentOS 7 ELS | httpd | 2.4.6 | 5.3 | MEDIUM | Ignored | 2023-09-19 09:30:22 | Ignored due to low severity | |
| CentOS 8.4 ELS | httpd | 2.4.37 | 5.3 | MEDIUM | Released | CLSA-2022:1668705928 | 2022-11-17 13:25:02 | |
| CentOS 8.5 ELS | httpd | 2.4.37 | 5.3 | MEDIUM | Released | CLSA-2022:1668706027 | 2022-11-17 13:25:01 | |
| CloudLinux 6 ELS | httpd | 2.2.15 | 5.3 | MEDIUM | Released | CLSA-2022:1663591765 | 2022-10-03 08:05:56 | |
| Oracle Linux 6 ELS | httpd | 2.2.15 | 5.3 | MEDIUM | Released | CLSA-2022:1663592078 | 2022-09-19 11:04:54 | |
| Ubuntu 16.04 ELS | apache2 | 2.4.18 | 5.3 | MEDIUM | Released | CLSA-2022:1656959316 | 2022-07-04 14:43:48 | |
| Ubuntu 18.04 ELS | apache2 | 2.4.29 | 5.3 | MEDIUM | Ignored | 2023-03-02 04:04:19 | Ignored due to low severity |