[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RLSA-2022:7647 --- httpd

ID: oval:org.secpod.oval:def:4500970Date: (C)2023-04-03   (M)2024-01-29
Class: PATCHFamily: unix




The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix: * httpd: mod_sed: Read/write beyond bounds * httpd: mod_lua: Use of uninitialized value of in r:parsebody * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody * httpd: mod_proxy_ajp: Possible request smuggling * httpd: mod_lua: DoS in r:parsebody * httpd: mod_sed: DoS vulnerability * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism * httpd: Out-of-bounds read via ap_rwrite * httpd: Out-of-bounds read in ap_strcmp_match * httpd: mod_lua: Information disclosure with websockets For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.

Platform:
Rocky Linux 8
Product:
httpd
mod_http2
mod_md
mod_ldap
mod_proxy_html
mod_session
mod_ssl
Reference:
RLSA-2022:7647
CVE-2022-22719
CVE-2022-22721
CVE-2022-23943
CVE-2022-26377
CVE-2022-28614
CVE-2022-28615
CVE-2022-29404
CVE-2022-30522
CVE-2022-30556
CVE-2022-31813
CVE    10
CVE-2022-23943
CVE-2022-31813
CVE-2022-26377
CVE-2022-29404
...

© SecPod Technologies