[CLSA-2022:1649695619] Fixed CVE-2021-3618 in nginx
Type:
security
Severity:
Important
Release date:
2022-04-11
Description:
- CVE-2021-3618: drop the connection after reaching the specified number of invalid protocol commmands
Updated packages:
  • nginx-mod-http-geoip-1.10.3-4.el6.tuxcare.els4.x86_64.rpm
    sha:256c0370c42cd5b6fff9b45a8612e0644c809181
  • nginx-mod-http-image-filter-1.10.3-4.el6.tuxcare.els4.x86_64.rpm
    sha:8bebe45acb270ad4d057ad1af8212c05351d0f2b
  • nginx-all-modules-1.10.3-4.el6.tuxcare.els4.noarch.rpm
    sha:9d189c1148ff7c8031816cc3d8a0a60a675ab00b
  • nginx-filesystem-1.10.3-4.el6.tuxcare.els4.noarch.rpm
    sha:89bcaffcefebeae5dbfddb8c7ef428318647e6a0
  • nginx-mod-http-xslt-filter-1.10.3-4.el6.tuxcare.els4.x86_64.rpm
    sha:496aed35a01076c7f98add281e249bb1a9f315af
  • nginx-1.10.3-4.el6.tuxcare.els4.x86_64.rpm
    sha:6e8c34b30aba8a12fdb1b97c7ede931f35d5de3c
  • nginx-mod-http-perl-1.10.3-4.el6.tuxcare.els4.x86_64.rpm
    sha:1fe92a6c21ab200cd270f8bc415560af61e7fdbb
  • nginx-mod-stream-1.10.3-4.el6.tuxcare.els4.x86_64.rpm
    sha:789af0456d8a86181bc55a3b23a175382be79e07
  • nginx-mod-mail-1.10.3-4.el6.tuxcare.els4.x86_64.rpm
    sha:61eb6191bbe3342eebe5646edd6e90e2d9161f5a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.