First published: Tue Sep 03 2024(Updated: )
Important: httpd:2.4 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-filesystem | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-manual | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-debuginfo | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-debugsource | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-devel | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-tools | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-tools-debuginfo | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-debuginfo | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-debugsource | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-devel | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-tools | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-tools-debuginfo | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-debuginfo | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-debugsource | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-devel | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-tools | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd-tools-debuginfo | <2.4.37-56.module+el8.8.0+22230+712d65df.9 | 2.4.37-56.module+el8.8.0+22230+712d65df.9 |
redhat/httpd | <2.4.37-56.module+el8.8.0+22230+712d65df.9.aa | 2.4.37-56.module+el8.8.0+22230+712d65df.9.aa |
redhat/httpd-debuginfo | <2.4.37-56.module+el8.8.0+22230+712d65df.9.aa | 2.4.37-56.module+el8.8.0+22230+712d65df.9.aa |
redhat/httpd-debugsource | <2.4.37-56.module+el8.8.0+22230+712d65df.9.aa | 2.4.37-56.module+el8.8.0+22230+712d65df.9.aa |
redhat/httpd-devel | <2.4.37-56.module+el8.8.0+22230+712d65df.9.aa | 2.4.37-56.module+el8.8.0+22230+712d65df.9.aa |
redhat/httpd-tools | <2.4.37-56.module+el8.8.0+22230+712d65df.9.aa | 2.4.37-56.module+el8.8.0+22230+712d65df.9.aa |
redhat/httpd-tools-debuginfo | <2.4.37-56.module+el8.8.0+22230+712d65df.9.aa | 2.4.37-56.module+el8.8.0+22230+712d65df.9.aa |
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:6136 is classified as Important.
To fix RHSA-2024:6136, update your httpd package to version 2.4.37-56.module+el8.8.0+22230+712d65df.9.
RHSA-2024:6136 affects all versions of httpd prior to 2.4.37-56.module+el8.8.0+22230+712d65df.9.
The RHSA-2024:6136 advisory impacts multiple Red Hat Enterprise Linux products including x86_64, ARM 64, and Power architectures.
Yes, you can use the command 'yum update httpd' to apply the update for RHSA-2024:6136.