Description:
- CVE-2022-22719: mod_lua: error out if lua_read_body() or lua_write_body() fail
- CVE-2022-22720: simpler connection close logic if discarding the request body fails
- CVE-2022-22721: make sure and check that LimitXMLRequestBody fits in system memory
- CVE-2022-23943: mod_sed: use size_t to allow for larger buffer sizes and unsigned arithmetics
and refactor logic flow of set_write_output() to avoid out-of-bounds write
Updated packages:
-
httpd-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
sha:c01a6ccdb59112da489f374c48dd889096a26561
-
mod_session-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
sha:a8c98a227501cae0c1744e42e13ccf489acdb562
-
httpd-manual-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.noarch.rpm
sha:f64c9a5addc309ea115a0f48e6c1b2b29523e74f
-
mod_proxy_html-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
sha:465293b6c5ec8d80537604dedc5d0eba02c40e85
-
httpd-devel-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
sha:6e576e81ea8650aee782f9ce85a2e340be2009a6
-
mod_ssl-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
sha:1a2a24069ce7b5fee7d8c205acd2d36f991426c5
-
httpd-filesystem-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.noarch.rpm
sha:f6d485f47eb20979692bd1bfdb7037df136bbe91
-
mod_ldap-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
sha:261c9104ac2f9f29175c7ca71fb1e8badfd18e36
-
httpd-tools-2.4.37-43.module_el8.5.0+2021+51c6d843.tuxcare.els3.x86_64.rpm
sha:d7cbde0b5d5aa9b9685bce894fd4bbf6e71358df
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.