Description:
- CVE-2020-35452: mod_auth_digest: fix a single zero byte stack overflow (#1968278)
- CVE-2021-33193: fix request splitting via HTTP/2 method injection and mod_proxy (#1972491)
Updated packages:
-
mod_ssl-2.4.37-43.module_el8.5.0+2046+6f259f31.tuxcare.els4.x86_64.rpm
sha:d6ae86bb040003256cd6e9f1717f563673840675
-
httpd-devel-2.4.37-43.module_el8.5.0+2046+6f259f31.tuxcare.els4.x86_64.rpm
sha:5e38d5ceaa54d3c80737a6299008af9f6584b07c
-
httpd-2.4.37-43.module_el8.5.0+2046+6f259f31.tuxcare.els4.x86_64.rpm
sha:a335268dc32b72ffb20fe77a472c8c603570cc00
-
mod_md-2.0.8-8.module_el8.5.0+2046+6f259f31.x86_64.rpm
sha:ae31bbcf7e5b207ae2a9c2e1ffd79487c5495867
-
httpd-filesystem-2.4.37-43.module_el8.5.0+2046+6f259f31.tuxcare.els4.noarch.rpm
sha:76ae598e07223f3ce7b020dada831d469382033f
-
httpd-tools-2.4.37-43.module_el8.5.0+2046+6f259f31.tuxcare.els4.x86_64.rpm
sha:c459a5d5d1d9a09830026e1eb13c694272571f8b
-
httpd-manual-2.4.37-43.module_el8.5.0+2046+6f259f31.tuxcare.els4.noarch.rpm
sha:7bab468a163186f08a936f5fc84d173bdbe63648
-
mod_ldap-2.4.37-43.module_el8.5.0+2046+6f259f31.tuxcare.els4.x86_64.rpm
sha:16ce3da38535f5c76c2437af02fbbf2b6b1a2e82
-
mod_session-2.4.37-43.module_el8.5.0+2046+6f259f31.tuxcare.els4.x86_64.rpm
sha:27efbf0da1e0f47b746f79ccbb50905743afb04d
-
mod_http2-1.15.7-3.module_el8.5.0+2046+6f259f31.x86_64.rpm
sha:7dd2752a7e7ae71de3814f9ae606214c249db74e
-
mod_proxy_html-2.4.37-43.module_el8.5.0+2046+6f259f31.tuxcare.els4.x86_64.rpm
sha:12550d1e4cc1e990f59aded3c4060c2182226e38
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.