[CLSA-2023:1696536930] httpd: Fix of 4 CVEs
Type:
security
Severity:
Important
Release date:
2023-10-05
Description:
- CVE-2021-26690: Fix NULL pointer dereference in mod_session - CVE-2022-22719: Fix possible process crash due to unnoticed failures in mod_lua - CVE-2022-29404: Fix possible DoS due to no default limit on possible input size in mod_lua - CVE-2022-26377: Fix possible HTTP request smuggling in mod_proxy_ajp
Updated packages:
  • httpd-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
    sha:8457081a779136e2455d91a593e78702d66f3142
  • httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
    sha:5e0ff81be6bc38ff2a5e1b699b739b79a44e6407
  • httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els2.noarch.rpm
    sha:78998f720701b87eb8a031ec1d767bae891d6252
  • httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
    sha:1ac6e08d603add02654d8babeca7fec4d5d0ff3e
  • mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
    sha:595b84b2e24b20cd18670df68cac0f627b4b3db6
  • mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
    sha:cd1de0eaa2a4e846a7e6741165df05c6e9c5105f
  • mod_session-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
    sha:7596090f0b5a9d6727c24fbbca840e2899ffc813
  • mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
    sha:86c41b836ea727c7f7295bed70044c2683e8a2c8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.