[CLSA-2022:1649696332] Fix of CVE: CVE-2021-3618
Type:
security
Severity:
moderate
Release date:
2022-04-11
Description:
- CVE-2021-3618: drop the connection after reaching the specified number of invalid protocol commmands
Updated packages:
  • nginx-mod-mail-1.14.1-9.module_el8.5.0+2024+af250afe.tuxcare.els2.x86_64.rpm
    sha:0c9cb759131d1769e89b2462a5d0c5f67ca20bd0
  • nginx-1.14.1-9.module_el8.5.0+2024+af250afe.tuxcare.els2.x86_64.rpm
    sha:d59120aba1f72aa4c55a9473faefd6e33df00454
  • nginx-mod-http-xslt-filter-1.14.1-9.module_el8.5.0+2024+af250afe.tuxcare.els2.x86_64.rpm
    sha:dcc9ea16557787e37db6851411537db05af53fdb
  • nginx-mod-http-perl-1.14.1-9.module_el8.5.0+2024+af250afe.tuxcare.els2.x86_64.rpm
    sha:3b5d805bc1de749d3059a9e626fa26d12088b82f
  • nginx-filesystem-1.14.1-9.module_el8.5.0+2024+af250afe.tuxcare.els2.noarch.rpm
    sha:af9d0fc96e1af4b797008946f08ba97e110d3875
  • nginx-all-modules-1.14.1-9.module_el8.5.0+2024+af250afe.tuxcare.els2.noarch.rpm
    sha:c411d8cd544177a9579cd172bdb489e88001e6e5
  • nginx-mod-http-image-filter-1.14.1-9.module_el8.5.0+2024+af250afe.tuxcare.els2.x86_64.rpm
    sha:f1e18ffdb9eabfbb71b3cb9256a4c8b0dbf513cc
  • nginx-mod-stream-1.14.1-9.module_el8.5.0+2024+af250afe.tuxcare.els2.x86_64.rpm
    sha:0a6b082633de96058078d2af0ccace62d585c182
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.