[CLSA-2022:1644869383] Fix of CVE: CVE-2021-39275, CVE-2021-36160, CVE-2021-34798, CVE-2021-44224
Type:
security
Severity:
moderate
Release date:
2022-02-14
Description:
- CVE-2021-44224: possible NULL dereference or SSRF in forward proxy configurations - CVE-2021-39275: out-of-bounds write in ap_escape_quotes() via malicious input - CVE-2021-36160: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path - CVE-2021-34798: NULL pointer dereference via malformed requests
Updated packages:
  • httpd-2.4.37-43.module_el8.5.0+2007+c4b14997.tuxcare.els2.x86_64.rpm
    sha:237440f95552eeaf25fb04b84cb094c6007ca894
  • httpd-manual-2.4.37-43.module_el8.5.0+2007+c4b14997.tuxcare.els2.noarch.rpm
    sha:a6cb6c025713a7e4cf13eeef8f3370327b7229e3
  • httpd-tools-2.4.37-43.module_el8.5.0+2007+c4b14997.tuxcare.els2.x86_64.rpm
    sha:57608a7f49edcfeb54fddf7dc5e421ef376988c4
  • mod_ldap-2.4.37-43.module_el8.5.0+2007+c4b14997.tuxcare.els2.x86_64.rpm
    sha:6468cec7fcaaa40e12c639f2c1535bc1726771b8
  • mod_session-2.4.37-43.module_el8.5.0+2007+c4b14997.tuxcare.els2.x86_64.rpm
    sha:83ca9fea28109d32a2bc23a1b43e14aa7a6a75e5
  • mod_ssl-2.4.37-43.module_el8.5.0+2007+c4b14997.tuxcare.els2.x86_64.rpm
    sha:f1f77d5e22d1c5b109f9ae9f922ed9d62159b7e4
  • httpd-devel-2.4.37-43.module_el8.5.0+2007+c4b14997.tuxcare.els2.x86_64.rpm
    sha:605f502319642f3182f942b6f8d6089a312af861
  • mod_proxy_html-2.4.37-43.module_el8.5.0+2007+c4b14997.tuxcare.els2.x86_64.rpm
    sha:6b5673d4f995f7eefe2af0a08737e7714c6f7323
  • httpd-filesystem-2.4.37-43.module_el8.5.0+2007+c4b14997.tuxcare.els2.noarch.rpm
    sha:9bf5f50b832b0e5158ae80befd9902649ce23933
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.