First published: Mon Aug 12 2024(Updated: )
Important: httpd:2.4 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-filesystem | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-manual | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-debuginfo | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-debugsource | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-devel | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-tools | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-tools-debuginfo | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-debuginfo | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-debugsource | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-devel | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-tools | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-tools-debuginfo | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-debuginfo | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-debugsource | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-devel | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-tools | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd-tools-debuginfo | <2.4.37-65.module+el8.10.0+22196+d82931da.2 | 2.4.37-65.module+el8.10.0+22196+d82931da.2 |
redhat/httpd | <2.4.37-65.module+el8.10.0+22196+d82931da.2.aa | 2.4.37-65.module+el8.10.0+22196+d82931da.2.aa |
redhat/httpd-debuginfo | <2.4.37-65.module+el8.10.0+22196+d82931da.2.aa | 2.4.37-65.module+el8.10.0+22196+d82931da.2.aa |
redhat/httpd-debugsource | <2.4.37-65.module+el8.10.0+22196+d82931da.2.aa | 2.4.37-65.module+el8.10.0+22196+d82931da.2.aa |
redhat/httpd-devel | <2.4.37-65.module+el8.10.0+22196+d82931da.2.aa | 2.4.37-65.module+el8.10.0+22196+d82931da.2.aa |
redhat/httpd-tools | <2.4.37-65.module+el8.10.0+22196+d82931da.2.aa | 2.4.37-65.module+el8.10.0+22196+d82931da.2.aa |
redhat/httpd-tools-debuginfo | <2.4.37-65.module+el8.10.0+22196+d82931da.2.aa | 2.4.37-65.module+el8.10.0+22196+d82931da.2.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:5193 is classified as Important.
To fix RHSA-2024:5193, update the httpd package to version 2.4.37-65.module+el8.10.0+22196+d82931da.2 or later.
RHSA-2024:5193 addresses security issues related to malicious response headers from backend applications identified as CVE-2024-38476.
RHSA-2024:5193 affects multiple architectures of Red Hat Enterprise Linux including x86_64, Power, IBM z Systems, and ARM 64.
The impacted packages include httpd, httpd-filesystem, httpd-manual, and several others related to the Apache HTTP Server.