[CLSA-2022:1648136371] Fix of CVE: CVE-2022-22721, CVE-2022-23943, CVE-2022-22719, CVE-2022-22720
Type:
security
Severity:
moderate
Release date:
2022-03-24
Description:
- CVE-2022-22719: mod_lua: error out if lua_read_body() or lua_write_body() fail - CVE-2022-22720: simpler connection close logic if discarding the request body fails - CVE-2022-22721: make sure and check that LimitXMLRequestBody fits in system memory - CVE-2022-23943: mod_sed: use size_t to allow for larger buffer sizes and unsigned arithmetics and refactor logic flow of sed_write_output() to avoid out-of-bounds write
Updated packages:
  • mod_proxy_html-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
    sha:d42fbdb47e85bb89c03088133f9e1a9c739a843b
  • httpd-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
    sha:955a1dc50d783b3806a2449962690c41539e6bed
  • httpd-devel-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
    sha:2f4bcc66923d9aa373ab65c286ce188cdc047da7
  • httpd-tools-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
    sha:df441482649a1da1bfe1ff63657a5d4265aa146a
  • mod_ssl-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
    sha:fafe7f546056e1bb1b5d028f98b50b6ab72c4bc1
  • mod_ldap-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
    sha:2335511a3f2b95e85d6ca2cb5954b9c094473d35
  • httpd-filesystem-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.noarch.rpm
    sha:ea6f53c9dfe5237595cf09b10f0d3a4a127d4b37
  • httpd-manual-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.noarch.rpm
    sha:cd1a7fdbe3fb4707617c2506c4d2c91b0d6ed51d
  • mod_session-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
    sha:c82a17afd8fe41d5534d1588fa9057918d408475
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.