First published: Mon Sep 09 2024(Updated: )
Important: httpd:2.4 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-filesystem | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-manual | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-debuginfo | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-debugsource | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-devel | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-tools | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-tools-debuginfo | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-debuginfo | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-debugsource | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-devel | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-tools | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
redhat/httpd-tools-debuginfo | <2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 | 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:6467 has been classified as an important severity level due to security issues identified in the Apache HTTP Server.
You can fix RHSA-2024:6467 by updating the httpd packages to version 2.4.37-39.module+el8.4.0+22233+7f67fd1f.9.
RHSA-2024:6467 affects multiple versions of the Apache HTTP Server included in Red Hat Enterprise Linux products.
RHSA-2024:6467 addresses security vulnerabilities related to exploitability and malicious response headers in backend applications.
The recommended action for users is to apply the necessary updates to mitigate the security vulnerabilities.