Description:
- CVE-2022-22719: mod_lua: error out if lua_read_body() or lua_write_body() fail
- CVE-2022-22720: simpler connection close logic if discarding the request body fails
- CVE-2022-22721: make sure and check that LimitXMLRequestBody fits in system memory
- CVE-2022-23943: mod_sed: use size_t to allow for larger buffer sizes and unsigned arithmetics
and refactor logic flow of sed_write_output() to avoid out-of-bounds write
Updated packages:
-
mod_proxy_html-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
sha:d42fbdb47e85bb89c03088133f9e1a9c739a843b
-
httpd-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
sha:955a1dc50d783b3806a2449962690c41539e6bed
-
httpd-devel-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
sha:2f4bcc66923d9aa373ab65c286ce188cdc047da7
-
httpd-tools-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
sha:df441482649a1da1bfe1ff63657a5d4265aa146a
-
mod_ssl-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
sha:fafe7f546056e1bb1b5d028f98b50b6ab72c4bc1
-
mod_ldap-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
sha:2335511a3f2b95e85d6ca2cb5954b9c094473d35
-
httpd-filesystem-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.noarch.rpm
sha:ea6f53c9dfe5237595cf09b10f0d3a4a127d4b37
-
httpd-manual-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.noarch.rpm
sha:cd1a7fdbe3fb4707617c2506c4d2c91b0d6ed51d
-
mod_session-2.4.37-39.module_el8.4.0+2020+51c6d843.1.tuxcare.els4.x86_64.rpm
sha:c82a17afd8fe41d5534d1588fa9057918d408475
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.