Chapter 3. Security Fixes
This update includes the following security fixes:
ID | Impact | Summary |
---|---|---|
Important | httpd: path traversal and file disclosure vulnerability [jbcs-httpd-2.4] | |
Important | httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" [jbcs-httpd-2.4] | |
Moderate | openssl: Read buffer overruns processing ASN.1 strings [jbcs-httpd-2.4] | |
Moderate | mod_proxy: Red Hat JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure [jbcs-httpd-2.4] | |
Moderate | curl: Bad connection reuse due to flawed path name checks [jbcs-httpd-2.4] | |
Moderate | curl: Content not matching hash in Metalink is not being discarded [jbcs-httpd-2.4] | |
Moderate | curl: Metalink download sends credentials [jbcs-httpd-2.4] | |
Moderate | httpd: Unexpected URL matching with 'MergeSlashes OFF' [jbcs-httpd-2.4] | |
Moderate | httpd: mod_proxy_wstunnel tunneling of non Upgraded connection [jbcs-httpd-2.4] | |
Moderate | httpd: mod_session: Heap overflow via a crafted SessionHeader value [jbcs-httpd-2.4] | |
Moderate | httpd: mod_session: NULL pointer dereference when parsing Cookie header [jbcs-httpd-2.4] | |
Moderate | openssl: integer overflow in CipherUpdate [jbcs-httpd-2.4] | |
Moderate | openssl: NULL pointer dereference in X509_issuer_and_serial_hash() [jbcs-httpd-2.4] | |
Low | pcre: Integer overflow when parsing callout numeric arguments [jbcs-httpd-2.4] | |
Low | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 [jbcs-httpd-2.4] | |
Low | curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure [jbcs-httpd-2.4] | |
Low | httpd: mod_proxy NULL pointer dereference [jbcs-httpd-2.4] | |
Low | httpd: Single zero byte stack overflow in mod_auth_digest [jbcs-httpd-2.4] |