Release date:
2024-09-11 18:17:23 UTC
Description:
- CVE-2022-23943: Fix out-of-bound write in mod_sed
- CVE-2022-22721: Fix integer overflow which resulted in out-of-bounds write
- CVE-2022-28615: Fix read beyond bounds in ap_strcmp_match()
- CVE-2022-31813: Fix possible bypass of IP based authentication
- CVE-2021-26690: Fix NULL pointer dereference in mod_session
- CVE-2022-22719: Fix possible process crash due to unnoticed failures in mod_lua
- CVE-2022-29404: Fix possible DoS due to no default limit on possible input size
in mod_lua
- CVE-2022-26377: Fix possible HTTP request smuggling in mod_proxy_ajp
- CVE-2023-31122: mod_macro: Fix out-of-bounds read vulnerability
by using own strncmp function
- CVE-2024-38474: mod_rewrite: server weakness with encoded question marks
in backreferences
- CVE-2024-38475: mod_rewrite: server weakness in mod_rewrite when first
segment of substitution matches filesystem path
- CVE-2024-38477: mod_proxy: crash resulting in Denial of Service in
mod_proxy via a malicious request
- CVE-2024-38476: http: server use exploitable/malicious backend application
output to run local handlers via internal redirect
- CVE-2024-39573: mod_rewrite: proxy handler substitution
- CVE-2024-39884: modules: source code disclosure with handlers configured via AddType.
Resolving regression introduced by CVE-2024-38476 fix
- CVE-2024-40725: modules: source code disclosure with handlers configured via AddType.
Resolving regression introduced by CVE-2024-39884 fix
Updated packages:
-
httpd-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
sha:d899a96fbc65db188481c5f1273dbede01369c98a6c5f1f5adef74ee30406a66
-
httpd-devel-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
sha:a9963af65574b308ec464faf6c32e24a43f51a86c8d5ec8eb544ad4d368332ac
-
httpd-manual-2.4.6-99.el7.1.tuxcare.els6.noarch.rpm
sha:fc082af574d50c9a56919a00964eb482cbce4c330783b2c6ac0cdac076799a3f
-
httpd-tools-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
sha:a07c26e27a05e5ff60694c9065572146c0e535863e187ae3fd1dd5cb438ac32d
-
mod_ldap-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
sha:43be362fe0a2739087f3f55da375e90fd9e9250c69579a72e4f010bb7118a0f0
-
mod_proxy_html-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
sha:0fcf709bb880b9917328d2571f57449dbe5571773107d68c0cb5d85b5ecf65bd
-
mod_session-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
sha:a7a16ad9768c2d799d9f5d816e4cabe1dea53f88f751dc5326e84b62ae84cc22
-
mod_ssl-2.4.6-99.el7.1.tuxcare.els6.x86_64.rpm
sha:f06b28d11f9592667904d2a467b6bf423e617a5565baac57cf9380c3d0318784
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.