Release date:
2022-06-28 15:42:29 UTC
Description:
* SECURITY UPDATE: mod_sed may make excessively large memory allocations
and trigger an abort
- debian/patches/CVE-2022-30522.patch: limit mod_sed memory usage
- CVE-2022-30522
* SECURITY UPDATE: HTTP request smuggling in mod_proxy_ajp
- debian/patches/CVE-2022-26377.patch: parse request headers in the
way so Transfer-Encoding has precedence over Content-Length
- CVE-2022-26377
* SECURITY UPDATE: possible out-of-bounds read in ap_strcmp_match()
with an extremely large input buffer
- debian/patches/CVE-2022-28615.patch: use apr_size_t (e.g. long)
for array indexing
- CVE-2022-28615
* SECURITY UPDATE: mod_lua r:wsread() may return length that points past
the end of the storage allocated for the buffer
- debian/patches/CVE-2022-30556.patch: consistently use
lua_websocket_readbytes() and check the return value
- CVE-2022-30556
* SECURITY UPDATE: mod_proxy may not send the X-Forwarded-* headers to the
origin server based on client side Connection header hop-by-hop mechanism
- debian/patches/CVE-2022-31813.patch: preserve original request headers
so an upstream knows what the original request hostname was
- CVE-2022-31813
Updated packages:
-
apache2_2.4.18-2ubuntu3.17+tuxcare.els5_amd64.deb
sha:eacb6cb73d2e56ef9e17562a7b92aacee5452c15
-
apache2-bin_2.4.18-2ubuntu3.17+tuxcare.els5_amd64.deb
sha:9fa32c9bd8f6f40719360bada8ae3a2c68993e9f
-
apache2-data_2.4.18-2ubuntu3.17+tuxcare.els5_all.deb
sha:e2aa97c046edc9cfa9a90212ec461cf141019b85
-
apache2-dev_2.4.18-2ubuntu3.17+tuxcare.els5_amd64.deb
sha:ccd541c6f8cc23b2552c4bb985fba4b6226764ad
-
apache2-doc_2.4.18-2ubuntu3.17+tuxcare.els5_all.deb
sha:ea20e6b533b4c20ced86663562377828b4fe0c22
-
apache2-suexec-custom_2.4.18-2ubuntu3.17+tuxcare.els5_amd64.deb
sha:68a0876402472d76433188ef8b8ab2eb9a0bf263
-
apache2-suexec-pristine_2.4.18-2ubuntu3.17+tuxcare.els5_amd64.deb
sha:7ea9e3e04659191c0806ccef0a48e73d84159c76
-
apache2-utils_2.4.18-2ubuntu3.17+tuxcare.els5_amd64.deb
sha:82a10115aa94610f268db757233650564f44842e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.