Description:
- CVE-2022-23943: Fix out-of-bound write in mod_sed
- CVE-2022-22721: Fix integer overflow which resulted in out-of-bounds write
- CVE-2022-28615: Fix read beyond bounds in ap_strcmp_match()
- CVE-2022-31813: Fix possible bypass of IP based authentication
Updated packages:
-
httpd-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm
sha:abcebff4e25b456c277b446349e4f78de5adc010
-
httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm
sha:0df38b144f249b1dcbe3873a697908608a9edd21
-
httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els1.noarch.rpm
sha:7135ad62ce92a941e384ced7bdc93fb130a23ff0
-
httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm
sha:62376f47b9f878e613a9642b8cf12e9e5ce0be2a
-
mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm
sha:c6d070bcd6b67267cb24e98ff2d6c965e8175e0e
-
mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm
sha:3698fe8eb955a70e0bd60a7e8297ea029f33c11f
-
mod_session-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm
sha:d772a1b36c9387cc67b5f05a7a867d72488d6f97
-
mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm
sha:f8ba02ee9b65ea554aae13f7087bc465cc4c8008
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.