Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:3061-1

Опубликовано: 29 авг. 2024
Источник: suse-cvrf

Описание

Security update for apache2

This update for apache2 fixes the following issues:

  • CVE-2024-39884: Fixed source code disclosure with handlers configured via AddType (bsc#1227353)

Список пакетов

SUSE Linux Enterprise Server 12 SP5
apache2-2.4.51-35.60.1
apache2-doc-2.4.51-35.60.1
apache2-example-pages-2.4.51-35.60.1
apache2-prefork-2.4.51-35.60.1
apache2-tls13-2.4.51-35.60.1
apache2-tls13-doc-2.4.51-35.60.1
apache2-tls13-example-pages-2.4.51-35.60.1
apache2-tls13-prefork-2.4.51-35.60.1
apache2-tls13-utils-2.4.51-35.60.1
apache2-tls13-worker-2.4.51-35.60.1
apache2-utils-2.4.51-35.60.1
apache2-worker-2.4.51-35.60.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
apache2-2.4.51-35.60.1
apache2-doc-2.4.51-35.60.1
apache2-example-pages-2.4.51-35.60.1
apache2-prefork-2.4.51-35.60.1
apache2-tls13-2.4.51-35.60.1
apache2-tls13-doc-2.4.51-35.60.1
apache2-tls13-example-pages-2.4.51-35.60.1
apache2-tls13-prefork-2.4.51-35.60.1
apache2-tls13-utils-2.4.51-35.60.1
apache2-tls13-worker-2.4.51-35.60.1
apache2-utils-2.4.51-35.60.1
apache2-worker-2.4.51-35.60.1
SUSE Linux Enterprise Software Development Kit 12 SP5
apache2-devel-2.4.51-35.60.1
apache2-tls13-devel-2.4.51-35.60.1

Описание

A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.61, which fixes this issue.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.60.1
SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.60.1
SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.60.1
SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.60.1

Ссылки