<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0023</id>
    <title>An update for httpd is now available for HCE 1.1</title>
    <severity>Critical</severity>
    <release>HCE 1.1</release>
    <issued date="2023-01-05 02:56:00"/>
    <updated date="2023-01-05 02:56:00"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615" id="CVE-2022-28615" title="CVE-2022-28615 Base Score: 9.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377" id="CVE-2022-26377" title="CVE-2022-26377 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected. (CVE-2022-28615)

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions. (CVE-2022-26377)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="httpd">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="httpd" version="2.4.6" release="97.hce1c.8">
          <filename>httpd-2.4.6-97.hce1c.8.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="httpd-devel" version="2.4.6" release="97.hce1c.8">
          <filename>httpd-devel-2.4.6-97.hce1c.8.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="httpd-manual" version="2.4.6" release="97.hce1c.8">
          <filename>httpd-manual-2.4.6-97.hce1c.8.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="httpd-tools" version="2.4.6" release="97.hce1c.8">
          <filename>httpd-tools-2.4.6-97.hce1c.8.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mod_session" version="2.4.6" release="97.hce1c.8">
          <filename>mod_session-2.4.6-97.hce1c.8.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mod_ssl" version="2.4.6" release="97.hce1c.8">
          <filename>mod_ssl-2.4.6-97.hce1c.8.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
