Description:
- CVE-2020-35452: mod_auth_digest: fix a single zero byte stack overflow (#1968278)
- CVE-2021-33193: fix request splitting via HTTP/2 method injection and mod_proxy (#1972491)
Updated packages:
-
mod_ssl-2.4.37-39.module_el8.4.0+2047+54659116.1.tuxcare.els5.x86_64.rpm
sha:20ece2f00d063de68c9fd0852bd405fba9785ac3
-
mod_ldap-2.4.37-39.module_el8.4.0+2047+54659116.1.tuxcare.els5.x86_64.rpm
sha:d5ca02ed377f3f54065baf6d6b37668ad565c0f0
-
httpd-devel-2.4.37-39.module_el8.4.0+2047+54659116.1.tuxcare.els5.x86_64.rpm
sha:4c45e74063fddfbf4e85739aabb07faa5c321239
-
httpd-manual-2.4.37-39.module_el8.4.0+2047+54659116.1.tuxcare.els5.noarch.rpm
sha:37e46dff4e7f235843818c1b74b834060559cdbf
-
mod_http2-1.15.7-3.module_el8.4.0+2047+54659116.x86_64.rpm
sha:0efc27f9f434a6ead12b1dd902ecf62aad2d2676
-
httpd-tools-2.4.37-39.module_el8.4.0+2047+54659116.1.tuxcare.els5.x86_64.rpm
sha:886f167d1808525b2d598272d6cb64b2e7a57145
-
httpd-2.4.37-39.module_el8.4.0+2047+54659116.1.tuxcare.els5.x86_64.rpm
sha:f1337a6ad8cb5bfd61217a81caef90af0664ae29
-
mod_proxy_html-2.4.37-39.module_el8.4.0+2047+54659116.1.tuxcare.els5.x86_64.rpm
sha:7ff153b527a42b3aea14b2a63cdd8e3f39ffc0f8
-
mod_session-2.4.37-39.module_el8.4.0+2047+54659116.1.tuxcare.els5.x86_64.rpm
sha:60a3e72567748485ffec4bfed1050edf02dba84c
-
httpd-filesystem-2.4.37-39.module_el8.4.0+2047+54659116.1.tuxcare.els5.noarch.rpm
sha:45cdf709bb4164e17764303193f7cc29feb1cd13
-
mod_md-2.0.8-8.module_el8.4.0+2047+54659116.x86_64.rpm
sha:b1ec5781a50148efdc23363233d3eb10fa292e96
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.