[CLSA-2023:1701706552] httpd: Fix of 2 CVEs
Type:
security
Severity:
Important
Release date:
2023-12-04
Description:
- CVE-2023-27522: mod_proxy_uwsgi: HTTP response splitting - CVE-2023-31122: mod_macro: fix out-of-bounds read vulnerability by using own strncmp function
Updated packages:
  • httpd-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
    sha:45f0bd57db799d7539bf0b2872849592351ed4be
  • httpd-core-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
    sha:7315623823786e66197a47db43f474a563377297
  • httpd-devel-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
    sha:ce86ac09c61534fd1766d7b8189e58887772c3a6
  • httpd-filesystem-2.4.53-11.el9_2.5.tuxcare.els1.noarch.rpm
    sha:7f96e12875eca8a164fa365203ee9af56e1062d8
  • httpd-manual-2.4.53-11.el9_2.5.tuxcare.els1.noarch.rpm
    sha:7505a5d14551b9c4dfc3855062297684e31cfe30
  • httpd-tools-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
    sha:11a9c8ba4f6eb6afeac273bf2173d5fb1d1f99dc
  • mod_ldap-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
    sha:e6d8c203f0ef54e9b9653eca5db493a13836ceb0
  • mod_lua-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
    sha:371a35c2155ca2ae8de45244280d42340beac161
  • mod_proxy_html-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
    sha:9b2ee618b307d098c8f9cbfa2e1a64df589d6a47
  • mod_session-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
    sha:52783cc130088c745f2c4dfe74e44898012b753e
  • mod_ssl-2.4.53-11.el9_2.5.tuxcare.els1.x86_64.rpm
    sha:7e04b89a0e88bd9b5d40cbace5a54971c2a20972
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.