Description:
- CVE-2021-26690: Fix NULL pointer dereference in mod_session
- CVE-2022-22719: Fix possible process crash due to unnoticed failures in mod_lua
- CVE-2022-29404: Fix possible DoS due to no default limit on possible input size
in mod_lua
- CVE-2022-26377: Fix possible HTTP request smuggling in mod_proxy_ajp
Updated packages:
-
httpd-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
sha:8457081a779136e2455d91a593e78702d66f3142
-
httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
sha:5e0ff81be6bc38ff2a5e1b699b739b79a44e6407
-
httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els2.noarch.rpm
sha:78998f720701b87eb8a031ec1d767bae891d6252
-
httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
sha:1ac6e08d603add02654d8babeca7fec4d5d0ff3e
-
mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
sha:595b84b2e24b20cd18670df68cac0f627b4b3db6
-
mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
sha:cd1de0eaa2a4e846a7e6741165df05c6e9c5105f
-
mod_session-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
sha:7596090f0b5a9d6727c24fbbca840e2899ffc813
-
mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm
sha:86c41b836ea727c7f7295bed70044c2683e8a2c8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.