[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RLSA-2022:8067 --- httpd

ID: oval:org.secpod.oval:def:5800069Date: (C)2023-04-03   (M)2024-01-29
Class: PATCHFamily: unix




The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: httpd . Security Fix: * httpd: mod_sed: Read/write beyond bounds * httpd: mod_lua: Use of uninitialized value of in r:parsebody * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody * httpd: mod_proxy_ajp: Possible request smuggling * httpd: mod_lua: DoS in r:parsebody * httpd: mod_sed: DoS vulnerability * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism * httpd: Out-of-bounds read via ap_rwrite * httpd: Out-of-bounds read in ap_strcmp_match * httpd: mod_lua: Information disclosure with websockets For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.

Platform:
Rocky Linux 9
Product:
httpd
mod_ldap
mod_lua
mod_proxy_html
mod_session
mod_ssl
Reference:
RLSA-2022:8067
CVE-2022-22719
CVE-2022-22721
CVE-2022-23943
CVE-2022-26377
CVE-2022-28614
CVE-2022-28615
CVE-2022-29404
CVE-2022-30522
CVE-2022-30556
CVE-2022-31813
CVE    10
CVE-2022-23943
CVE-2022-28615
CVE-2022-26377
CVE-2022-29404
...
CPE    5
cpe:/a:apache:mod_session
cpe:/a:apache:http_server
cpe:/a:apache:mod_proxy_html
cpe:/a:apache:mod_ldap
...

© SecPod Technologies