[CLSA-2026:1778934210] Fix of 7 CVEs
Type:
security
Severity:
Important
Release date:
2026-05-16 14:38:58 UTC
Description:
* SECURITY UPDATE: off-by-one OOB read in mod_proxy_ajp message getters - debian/patches/CVE-2026-33857.patch: tighten length checks (`> msg->len` -> `>= msg->len`) in ajp_msg_get_uint8/16/32 and ajp_msg_peek_uint8/16 in modules/proxy/ajp_msg.c. - CVE-2026-33857 * SECURITY UPDATE: heap over-read in mod_proxy_ajp via missing null-termination check in ajp_msg_get_string() - debian/patches/CVE-2026-34032.patch: switch the buffer overflow check to compare against msg->len and verify the expected null terminator is present before returning the pointer in modules/proxy/ajp_msg.c. - CVE-2026-34032 * SECURITY UPDATE: heap over-read and memory disclosure in mod_proxy_ajp ajp_parse_data() via missing minimum message-length validation - debian/patches/CVE-2026-34059.patch: reject AJP data messages whose `msg->len` is smaller than AJP_HEADER_LEN + AJP_HEADER_SZ_LEN + 1 + 1 before computing expected_len in modules/proxy/ajp_header.c. - CVE-2026-34059 * SECURITY UPDATE: local information disclosure via .htaccess / mod_setenvif / ProxyFCGISetEnvIf, where a non-privileged user with .htaccess write access could read files accessible to the httpd service account - debian/patches/CVE-2026-24072.patch: pass AP_EXPR_FLAG_RESTRICTED when parsing ap_expr expressions from htaccess context in modules/mappers/mod_rewrite.c, modules/metadata/mod_setenvif.c, and modules/proxy/mod_proxy_fcgi.c. - CVE-2026-24072 * SECURITY UPDATE: timing attack against mod_auth_digest allowing bypass of Digest authentication - debian/patches/CVE-2026-33006.patch: validate nonce and digest lengths earlier and replace the strcmp of the nonce hash with the constant-time apr_crypto_equals (apr-util >= 1.6) in modules/aaa/mod_auth_digest.c; bump APU minimum to 1.6 in configure.in. - CVE-2026-33006 * SECURITY UPDATE: NULL pointer dereference in mod_authn_socache crashes the child process in a caching forward proxy setup - debian/patches/CVE-2026-33007.patch: validate the URL before using the cache hash in construct_key() in modules/aaa/mod_authn_socache.c. - CVE-2026-33007 * SECURITY UPDATE: HTTP response splitting via newline/control characters in an outgoing status line forwarded from a compromised backend - debian/patches/CVE-2026-33523.patch: reject status reason strings that contain newlines or control characters in modules/http/http_filters.c. - CVE-2026-33523
Updated packages:
  • apache2_2.4.41-4ubuntu3.23+tuxcare.els4_amd64.deb
    sha:c3ef4d4ce18786768553b9bdd291e49bd1eab187
  • apache2-bin_2.4.41-4ubuntu3.23+tuxcare.els4_amd64.deb
    sha:c5116ae212c3879e21867b08994ee19068fbb8ab
  • apache2-data_2.4.41-4ubuntu3.23+tuxcare.els4_all.deb
    sha:610e910f6507372dca860571d2b626db6b207806
  • apache2-dev_2.4.41-4ubuntu3.23+tuxcare.els4_amd64.deb
    sha:37eecf7462a422f62b745558a98b8bf7e82536c1
  • apache2-doc_2.4.41-4ubuntu3.23+tuxcare.els4_all.deb
    sha:d56ae88cf5c3a3478548621087113fd67b0c6536
  • apache2-ssl-dev_2.4.41-4ubuntu3.23+tuxcare.els4_amd64.deb
    sha:eb05a8741724dcf59ce50fed52183c249f8a59b7
  • apache2-suexec-custom_2.4.41-4ubuntu3.23+tuxcare.els4_amd64.deb
    sha:ad95db3d63a09e77d58d1bf46842f9cc572e4322
  • apache2-suexec-pristine_2.4.41-4ubuntu3.23+tuxcare.els4_amd64.deb
    sha:8dba5ac7b6cd7141294570c2a25e02284ac31442
  • apache2-utils_2.4.41-4ubuntu3.23+tuxcare.els4_amd64.deb
    sha:5fba9373a00a7a9152a97926b8b985ab4901c413
  • libapache2-mod-md_2.4.41-4ubuntu3.23+tuxcare.els4_amd64.deb
    sha:594bf31a20cb7466797653b3e2812e6d038404e5
  • libapache2-mod-proxy-uwsgi_2.4.41-4ubuntu3.23+tuxcare.els4_amd64.deb
    sha:f2c4cd8cea66b55b9fe46aeb8050fb37f185ea32
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.