[CLSA-2024:1722003981] httpd: Fix of 5 CVEs
Type:
security
Severity:
Critical
Release date:
2024-07-26 14:26:24 UTC
Description:
- CVE-2024-38474: mod_rewrite: server weakness with encoded question marks in backreferences - CVE-2024-38475: mod_rewrite: server weakness in mod_rewrite when first segment of substitution matches filesystem path - CVE-2024-38477: mod_proxy: crash resulting in Denial of Service in mod_proxy via a malicious request - CVE-2024-38476: http: server use exploitable/malicious backend application output to run local handlers via internal redirect - CVE-2024-39573: mod_rewrite: proxy handler substitution
Updated packages:
  • httpd-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
    sha:7d961f78651cc718c36dbc66fce19c9c2b3cc0ad
  • httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
    sha:0d8452290197a67530c5b398ac37275d7dbc7399
  • httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els4.noarch.rpm
    sha:dbf08f48e41f44c9d286240251f67c6dfbc3427e
  • httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
    sha:7f3f3a418be39ff57a332d8265427f8b2b11a3d4
  • mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
    sha:2aeb0c3f7b98cee7f0e7830c400b653b7a7e8d91
  • mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
    sha:195b4b9f9177c384497680e78845df96ca53c109
  • mod_session-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
    sha:a9f442976d4523d6650215c53b83fcad2d8ef17f
  • mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm
    sha:1f5cc7ae9affe8e1b307dfa8d76cf603e40d7d55
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.