Release date:
2024-07-26 14:26:24 UTC
Description:
- CVE-2024-38474: mod_rewrite: server weakness with encoded question marks
in backreferences
- CVE-2024-38475: mod_rewrite: server weakness in mod_rewrite when first
segment of substitution matches filesystem path
- CVE-2024-38477: mod_proxy: crash resulting in Denial of Service in
mod_proxy via a malicious request
- CVE-2024-38476: http: server use exploitable/malicious backend application
output to run local handlers via internal redirect
- CVE-2024-39573: mod_rewrite: proxy handler substitution
Updated packages:
-
httpd-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
sha:7d961f78651cc718c36dbc66fce19c9c2b3cc0ad
-
httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
sha:0d8452290197a67530c5b398ac37275d7dbc7399
-
httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els4.noarch.rpm
sha:dbf08f48e41f44c9d286240251f67c6dfbc3427e
-
httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
sha:7f3f3a418be39ff57a332d8265427f8b2b11a3d4
-
mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
sha:2aeb0c3f7b98cee7f0e7830c400b653b7a7e8d91
-
mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
sha:195b4b9f9177c384497680e78845df96ca53c109
-
mod_session-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
sha:a9f442976d4523d6650215c53b83fcad2d8ef17f
-
mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
sha:1f5cc7ae9affe8e1b307dfa8d76cf603e40d7d55
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.