RHSA-2022:8067-01 -- Redhat httpd, mod_ldap, mod_lua, mod_proxy_html, mod_session, mod_sslID: oval:org.secpod.oval:def:507391 | Date: (C)2022-11-23 (M)2024-01-29 |
Class: PATCH | Family: unix |
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: httpd . Security Fix: * httpd: mod_sed: Read/write beyond bounds * httpd: mod_lua: Use of uninitialized value of in r:parsebody * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody * httpd: mod_proxy_ajp: Possible request smuggling * httpd: mod_lua: DoS in r:parsebody * httpd: mod_sed: DoS vulnerability * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism * httpd: Out-of-bounds read via ap_rwrite * httpd: Out-of-bounds read in ap_strcmp_match * httpd: mod_lua: Information disclosure with websockets For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Platform: |
Red Hat Enterprise Linux 9 |
Product: |
httpd |
mod_ldap |
mod_lua |
mod_proxy_html |
mod_session |
mod_ssl |