Description:
- CVE-2023-27522: mod_proxy_uwsgi: HTTP response splitting
- CVE-2023-31122: mod_macro: fix out-of-bounds read vulnerability
by using own strncmp function
Updated packages:
-
httpd-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
sha:45f0bd57db799d7539bf0b2872849592351ed4be
-
httpd-core-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
sha:7315623823786e66197a47db43f474a563377297
-
httpd-devel-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
sha:ce86ac09c61534fd1766d7b8189e58887772c3a6
-
httpd-filesystem-2.4.53-11.el9_2.5.tuxcare.els1.noarch.rpm
sha:7f96e12875eca8a164fa365203ee9af56e1062d8
-
httpd-manual-2.4.53-11.el9_2.5.tuxcare.els1.noarch.rpm
sha:7505a5d14551b9c4dfc3855062297684e31cfe30
-
httpd-tools-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
sha:11a9c8ba4f6eb6afeac273bf2173d5fb1d1f99dc
-
mod_ldap-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
sha:e6d8c203f0ef54e9b9653eca5db493a13836ceb0
-
mod_lua-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
sha:371a35c2155ca2ae8de45244280d42340beac161
-
mod_proxy_html-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
sha:9b2ee618b307d098c8f9cbfa2e1a64df589d6a47
-
mod_session-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
sha:52783cc130088c745f2c4dfe74e44898012b753e
-
mod_ssl-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
sha:7e04b89a0e88bd9b5d40cbace5a54971c2a20972
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.