Описание
ELSA-2024-4197: httpd:2.4/httpd security update (MODERATE)
httpd [2.4.37-65.0.1]
- Replace index.html with Oracle's index page oracle_index.html
[2.4.37-65]
- Resolves: RHEL-31857 - httpd:2.4/httpd: HTTP response splitting (CVE-2023-38709)
mod_http2 mod_md
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
Module httpd:2.4 is enabled
httpd
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
httpd-devel
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
httpd-filesystem
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
httpd-manual
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
httpd-tools
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
mod_http2
1.15.7-10.module+el8.10.0+90327+96b8ea28
mod_ldap
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
mod_md
2.0.8-8.module+el8.9.0+90011+2f9c6a23
mod_proxy_html
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
mod_session
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
mod_ssl
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
Oracle Linux x86_64
Module httpd:2.4 is enabled
httpd
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
httpd-devel
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
httpd-filesystem
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
httpd-manual
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
httpd-tools
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
mod_http2
1.15.7-10.module+el8.10.0+90327+96b8ea28
mod_ldap
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
mod_md
2.0.8-8.module+el8.9.0+90011+2f9c6a23
mod_proxy_html
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
mod_session
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
mod_ssl
2.4.37-65.0.1.module+el8.10.0+90356+f7b9d583
Связанные CVE
Связанные уязвимости
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Faulty input validation in the core of Apache allows malicious or expl ...