Release date:
2024-10-28 17:32:48 UTC
Description:
- CVE-2024-8927: Fix bypass of cgi.force_redirect configuration
- CVE-2024-8925: Fix data integrity violation while parsing multipart/form-data
boundaries larger than the read buffer
Updated packages:
-
php-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:a29fcbbe99918715c7b2883df935f6671e22083c538a921fee60ccbe9ff4d761
-
php-bcmath-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:72f59d911d7c8deaf739750e770d12491642534b0e53f32a2fd16169c3bb6969
-
php-cli-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:c11d973d7da2ec77dcc2b73279979471678c4e35cb76c511584ab5122e581ac9
-
php-common-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:3d3d4682cd12774b8f7146fc13327bd0115649dae6569d7970976d3bcff480f7
-
php-dba-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:a6324216d5c6df07c5081f8d89b0356500cb3d6f0c5b9c147cb7991c71edfe27
-
php-dbg-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:e1bd0795381b3c886c07019828862dd59b82d1dc22ca7445e5774a417911a54f
-
php-devel-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:1590ad09e2e3f2f00b22a3b7009b9307a5e3946fe71af4c2cf9591ffdf58753d
-
php-embedded-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:34e3bf61e03245e3bfedc67c01581aed053c92943ba1c7e4bdec65cae00b9c84
-
php-enchant-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:235bea1cb7f7cc3b2e427f023bfef6459b0c15ae0dabd73bb7dc127aa443bb1b
-
php-fpm-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:97bf0622a8e17df5e503945017a0f903e82b69e0eff30e519fe0bbec3db4a684
-
php-gd-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:101d69574103c1f112c109630a6ce92627ba2afd31e9c4dc16ce8aa20e627fe5
-
php-gmp-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:41efdd8e858e856369170a4328eaef0323f18aca7cf500ec69741ce1914d0078
-
php-intl-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:2ef0673f5f87c40fdcfc35776131f5a00987caca84198056b1d0f0fe14b8b289
-
php-json-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:5a1ba5626d3357eeee859a93df122f6bd325dee0b70fdc5ad80e24d8b333ab1c
-
php-ldap-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:5c3994da819577573d59b062fca3a9a21c2203c341cd10a89fbff33e4226ffda
-
php-mbstring-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:8488de31bc84c3f87157f7e79447cbcded4784aa02c92b57297d1dfe759652c5
-
php-mysqlnd-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:6d2dfaf302dfc38bd76f075103a37bcd88502cfec79e66a22c85753d344a0a30
-
php-odbc-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:abe8ac45eb7070ace65d80f4b985e8a9a32e267aaa44f697cd75fe9140ad1298
-
php-opcache-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:577e274dad5ecffc402e10a5d59e88e004d9d17ded1fc3d29f2b1be0edd8c581
-
php-pdo-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:c1f74343470d9fa4c0a73082890d3412384d6e7b6c2a16a2712554f58c256937
-
php-pgsql-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:77ef90212af39fcc00b3431f3cc6a246b2777b42f397b5829b436889e0cbf9e8
-
php-process-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:c3279dabc5ac9949cc8eb70bab0108e1d74ad8e3963e1b7a8cc03d3f28a94e9b
-
php-recode-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:4df51d7f5f21b2988ea6b97b8007aee0431ed2fa9f1e1aba5829b16c4bc9b178
-
php-snmp-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:3bcaa647adb26eb14861d4ac3d8ea3da0714cb7b47e341d30e8f17cbcbb3eceb
-
php-soap-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:1dadb1f5c07981da4f3d44c1c9611912f7f95f01bcac64295c11f45888b19c59
-
php-xml-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:96789cfa1f2c1174476df196436f5da50c347868fabddf8a95d480e17a9c6378
-
php-xmlrpc-7.2.24-1.module_el8+2224+94df89ba.tuxcare.els2.x86_64.rpm
sha:3603129ac5d661fe1434f76f04190f0d07b7fae2d3fdebb64ff2bfe428300e09
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.