- Issued:
- 2024-07-23
- Updated:
- 2024-07-23
RHSA-2024:4726 - Important: httpd security update
Synopsis
Important: httpd security update
Type/Severity
Security Advisory Important
Topic
An update for httpd is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
-
httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
-
httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
-
httpd: null pointer dereference in mod_proxy (CVE-2024-38477)
-
httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)
-
httpd: Encoding problem in mod_proxy (CVE-2024-38473)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 | 9 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.4 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian | 9 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.4 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.4 | ppc64le |
| Red Hat Enterprise Linux for IBM z Systems | 9 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.4 | s390x |
| Red Hat Enterprise Linux for ARM 64 | 9 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.4 | aarch64 |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.6 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.4 | ppc64le |
| Red Hat Enterprise Linux Server - AUS | 9.6 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 9.4 | x86_64 |
Updated Packages
- mod_ldap-2.4.57-11.el9_4.ppc64le.rpm
- httpd-core-2.4.57-11.el9_4.s390x.rpm
- httpd-filesystem-2.4.57-11.el9_4.noarch.rpm
- httpd-tools-debuginfo-2.4.57-11.el9_4.s390x.rpm
- mod_ldap-debuginfo-2.4.57-11.el9_4.s390x.rpm
- mod_proxy_html-debuginfo-2.4.57-11.el9_4.ppc64le.rpm
- httpd-debuginfo-2.4.57-11.el9_4.aarch64.rpm
- httpd-tools-debuginfo-2.4.57-11.el9_4.aarch64.rpm
- mod_lua-2.4.57-11.el9_4.aarch64.rpm
- mod_proxy_html-2.4.57-11.el9_4.s390x.rpm
- mod_proxy_html-debuginfo-2.4.57-11.el9_4.s390x.rpm
- mod_ssl-debuginfo-2.4.57-11.el9_4.ppc64le.rpm
- mod_session-debuginfo-2.4.57-11.el9_4.s390x.rpm
- httpd-debugsource-2.4.57-11.el9_4.x86_64.rpm
- httpd-debuginfo-2.4.57-11.el9_4.s390x.rpm
- httpd-core-2.4.57-11.el9_4.x86_64.rpm
- httpd-devel-2.4.57-11.el9_4.aarch64.rpm
- httpd-2.4.57-11.el9_4.ppc64le.rpm
- mod_ldap-debuginfo-2.4.57-11.el9_4.aarch64.rpm
- httpd-core-2.4.57-11.el9_4.ppc64le.rpm
- mod_ldap-debuginfo-2.4.57-11.el9_4.x86_64.rpm
- httpd-core-debuginfo-2.4.57-11.el9_4.x86_64.rpm
- httpd-devel-2.4.57-11.el9_4.s390x.rpm
- httpd-manual-2.4.57-11.el9_4.noarch.rpm
- httpd-tools-2.4.57-11.el9_4.ppc64le.rpm
- mod_lua-debuginfo-2.4.57-11.el9_4.s390x.rpm
- mod_session-2.4.57-11.el9_4.x86_64.rpm
- httpd-debuginfo-2.4.57-11.el9_4.x86_64.rpm
- httpd-tools-2.4.57-11.el9_4.s390x.rpm
- httpd-tools-2.4.57-11.el9_4.aarch64.rpm
- mod_ssl-2.4.57-11.el9_4.s390x.rpm
- mod_ssl-debuginfo-2.4.57-11.el9_4.x86_64.rpm
- mod_ssl-debuginfo-2.4.57-11.el9_4.s390x.rpm
- httpd-2.4.57-11.el9_4.aarch64.rpm
- mod_lua-debuginfo-2.4.57-11.el9_4.x86_64.rpm
- httpd-debuginfo-2.4.57-11.el9_4.ppc64le.rpm
- httpd-tools-2.4.57-11.el9_4.x86_64.rpm
- mod_session-2.4.57-11.el9_4.ppc64le.rpm
- mod_ssl-debuginfo-2.4.57-11.el9_4.aarch64.rpm
- mod_session-debuginfo-2.4.57-11.el9_4.x86_64.rpm
- mod_ssl-2.4.57-11.el9_4.ppc64le.rpm
- httpd-devel-2.4.57-11.el9_4.ppc64le.rpm
- mod_session-2.4.57-11.el9_4.aarch64.rpm
- httpd-devel-2.4.57-11.el9_4.x86_64.rpm
- mod_ldap-2.4.57-11.el9_4.s390x.rpm
- httpd-2.4.57-11.el9_4.src.rpm
- httpd-core-debuginfo-2.4.57-11.el9_4.ppc64le.rpm
- mod_session-2.4.57-11.el9_4.s390x.rpm
- mod_proxy_html-2.4.57-11.el9_4.x86_64.rpm
- mod_session-debuginfo-2.4.57-11.el9_4.ppc64le.rpm
- mod_ldap-2.4.57-11.el9_4.x86_64.rpm
- mod_proxy_html-2.4.57-11.el9_4.aarch64.rpm
- httpd-2.4.57-11.el9_4.s390x.rpm
- httpd-core-debuginfo-2.4.57-11.el9_4.aarch64.rpm
- mod_proxy_html-debuginfo-2.4.57-11.el9_4.aarch64.rpm
- mod_lua-2.4.57-11.el9_4.x86_64.rpm
- mod_session-debuginfo-2.4.57-11.el9_4.aarch64.rpm
- mod_ssl-2.4.57-11.el9_4.aarch64.rpm
- mod_lua-debuginfo-2.4.57-11.el9_4.aarch64.rpm
- httpd-debugsource-2.4.57-11.el9_4.ppc64le.rpm
- httpd-core-debuginfo-2.4.57-11.el9_4.s390x.rpm
- httpd-debugsource-2.4.57-11.el9_4.s390x.rpm
- httpd-tools-debuginfo-2.4.57-11.el9_4.x86_64.rpm
- mod_ldap-debuginfo-2.4.57-11.el9_4.ppc64le.rpm
- mod_lua-2.4.57-11.el9_4.s390x.rpm
- mod_lua-2.4.57-11.el9_4.ppc64le.rpm
- mod_ldap-2.4.57-11.el9_4.aarch64.rpm
- mod_lua-debuginfo-2.4.57-11.el9_4.ppc64le.rpm
- mod_proxy_html-debuginfo-2.4.57-11.el9_4.x86_64.rpm
- mod_proxy_html-2.4.57-11.el9_4.ppc64le.rpm
- httpd-tools-debuginfo-2.4.57-11.el9_4.ppc64le.rpm
- httpd-debugsource-2.4.57-11.el9_4.aarch64.rpm
- httpd-2.4.57-11.el9_4.x86_64.rpm
- httpd-core-2.4.57-11.el9_4.aarch64.rpm
- mod_ssl-2.4.57-11.el9_4.x86_64.rpm
Fixes
- This content is not included.BZ - 2295012
- This content is not included.BZ - 2295013
- This content is not included.BZ - 2295014
- This content is not included.BZ - 2295016
- This content is not included.BZ - 2295022
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.