[CLSA-2024:1726078096] httpd: Fix of 16 CVEs
Type:
security
Severity:
Critical
Release date:
2024-09-11 18:17:23 UTC
Description:
- CVE-2022-23943: Fix out-of-bound write in mod_sed - CVE-2022-22721: Fix integer overflow which resulted in out-of-bounds write - CVE-2022-28615: Fix read beyond bounds in ap_strcmp_match() - CVE-2022-31813: Fix possible bypass of IP based authentication - CVE-2021-26690: Fix NULL pointer dereference in mod_session - CVE-2022-22719: Fix possible process crash due to unnoticed failures in mod_lua - CVE-2022-29404: Fix possible DoS due to no default limit on possible input size in mod_lua - CVE-2022-26377: Fix possible HTTP request smuggling in mod_proxy_ajp - CVE-2023-31122: mod_macro: Fix out-of-bounds read vulnerability by using own strncmp function - CVE-2024-38474: mod_rewrite: server weakness with encoded question marks in backreferences - CVE-2024-38475: mod_rewrite: server weakness in mod_rewrite when first segment of substitution matches filesystem path - CVE-2024-38477: mod_proxy: crash resulting in Denial of Service in mod_proxy via a malicious request - CVE-2024-38476: http: server use exploitable/malicious backend application output to run local handlers via internal redirect - CVE-2024-39573: mod_rewrite: proxy handler substitution - CVE-2024-39884: modules: source code disclosure with handlers configured via AddType. Resolving regression introduced by CVE-2024-38476 fix - CVE-2024-40725: modules: source code disclosure with handlers configured via AddType. Resolving regression introduced by CVE-2024-39884 fix
Updated packages:
  • httpd-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
    sha:d899a96fbc65db188481c5f1273dbede01369c98a6c5f1f5adef74ee30406a66
  • httpd-devel-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
    sha:a9963af65574b308ec464faf6c32e24a43f51a86c8d5ec8eb544ad4d368332ac
  • httpd-manual-2.4.6-99.el7.1.tuxcare.els6.noarch.rpm
    sha:fc082af574d50c9a56919a00964eb482cbce4c330783b2c6ac0cdac076799a3f
  • httpd-tools-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
    sha:a07c26e27a05e5ff60694c9065572146c0e535863e187ae3fd1dd5cb438ac32d
  • mod_ldap-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
    sha:43be362fe0a2739087f3f55da375e90fd9e9250c69579a72e4f010bb7118a0f0
  • mod_proxy_html-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
    sha:0fcf709bb880b9917328d2571f57449dbe5571773107d68c0cb5d85b5ecf65bd
  • mod_session-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
    sha:a7a16ad9768c2d799d9f5d816e4cabe1dea53f88f751dc5326e84b62ae84cc22
  • mod_ssl-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
    sha:f06b28d11f9592667904d2a467b6bf423e617a5565baac57cf9380c3d0318784
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.