[CLSA-2022:1648136411] Fix of CVE: CVE-2022-22721, CVE-2022-22719, CVE-2022-23943, CVE-2022-22720
Type:
security
Severity:
moderate
Release date:
2022-03-24
Description:
- CVE-2022-22719: mod_lua: error out if lua_read_body() or lua_write_body() fail - CVE-2022-22720: simpler connection close logic if discarding the request body fails - CVE-2022-22721: make sure and check that LimitXMLRequestBody fits in system memory - CVE-2022-23943: mod_sed: use size_t to allow for larger buffer sizes and unsigned arithmetics and refactor logic flow of set_write_output() to avoid out-of-bounds write
Updated packages:
  • httpd-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
    sha:c01a6ccdb59112da489f374c48dd889096a26561
  • mod_session-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
    sha:a8c98a227501cae0c1744e42e13ccf489acdb562
  • httpd-manual-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.noarch.rpm
    sha:f64c9a5addc309ea115a0f48e6c1b2b29523e74f
  • mod_proxy_html-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
    sha:465293b6c5ec8d80537604dedc5d0eba02c40e85
  • httpd-devel-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
    sha:6e576e81ea8650aee782f9ce85a2e340be2009a6
  • mod_ssl-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
    sha:1a2a24069ce7b5fee7d8c205acd2d36f991426c5
  • httpd-filesystem-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.noarch.rpm
    sha:f6d485f47eb20979692bd1bfdb7037df136bbe91
  • mod_ldap-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
    sha:261c9104ac2f9f29175c7ca71fb1e8badfd18e36
  • httpd-tools-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
    sha:d7cbde0b5d5aa9b9685bce894fd4bbf6e71358df
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.