httpd:2.4 security fix update

エラータID: AXSA:2024-8622:01

Release date: 
Monday, July 29, 2024 - 21:32
Subject: 
httpd:2.4 security fix update
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: Encoding problem in mod_proxy (CVE-2024-38473)
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)
* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-38473
Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CVE-2024-38474
Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
CVE-2024-38475
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
CVE-2024-38477
null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CVE-2024-39573
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.

Modularity name: "httpd"
Stream name: "2.4"

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. httpd-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.src.rpm
    MD5: 907add2cd1a86811d693f4de61c1c8a8
    SHA-256: 944940719abb12b793ed4ba018640a4272d2ec7682f82408ad105e61a97365d3
    Size: 6.97 MB
  2. mod_http2-1.15.7-10.module+el8+1792+7c1d95a2.src.rpm
    MD5: f4ad4abc9f12b6732d62f21d4dbe7cc6
    SHA-256: d522325f13af122a2a436bd2aa1e780dd9566e9b2c477580f3adfe3954efeffe
    Size: 1.02 MB
  3. mod_md-2.0.8-8.module+el8+1792+7c1d95a2.src.rpm
    MD5: 93d4a8b38635e9b1b1ed6323bf445d98
    SHA-256: 183e5bb3fda3c52defce004b10d0586b18379cc01bfa5ae6c7a26f29f337a142
    Size: 635.32 kB

Asianux Server 8 for x86_64
  1. httpd-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.x86_64.rpm
    MD5: de1be8cc2f106ccface7e5c0711989fe
    SHA-256: 3e6af1adb4e536e570b0ca0ef629600053c5dc48aa5a8510e588d15d20a7d2a8
    Size: 1.41 MB
  2. httpd-debugsource-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.x86_64.rpm
    MD5: 9fba9ede87d4169cbf0aef94a4bbbc0f
    SHA-256: b0ce422a574a48ae4409df1128675ad53e77249803b05d058319cab68777fb39
    Size: 1.46 MB
  3. httpd-devel-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.x86_64.rpm
    MD5: 0aa4454c8407f3d4e276bd4cac093916
    SHA-256: 67552e1592961d45099b504f1ba1748a11860b90c199b8b1d2d958a9dc2003b6
    Size: 227.55 kB
  4. httpd-filesystem-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.noarch.rpm
    MD5: 4154ec9056cbf4e76cc00deba2cd2ec4
    SHA-256: 14c168afc7a6fc85dc44e42c4029e846e1d4aa375c953489b8e7dd5e8f3e103a
    Size: 43.96 kB
  5. httpd-manual-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.noarch.rpm
    MD5: b413bfb9ada7969ff52b9cc0e1816bbd
    SHA-256: 89561a8be368a70ac9e94ae33fd0cceec2af832d813e5de93da6e467ce8a1671
    Size: 2.38 MB
  6. httpd-tools-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.x86_64.rpm
    MD5: 5c304851563fa011c4053b62ad7dff33
    SHA-256: e5be41faaabb0e73c9c6d8db47f26db296cf3800a462d8ec798319246bc18eaf
    Size: 111.11 kB
  7. mod_http2-1.15.7-10.module+el8+1792+7c1d95a2.x86_64.rpm
    MD5: 179c4e078ca477a7580a9071a6121018
    SHA-256: baf82b903b662f1fe045793fcec35b2fa5da11cfbe91499293f544ad5d5694b7
    Size: 154.58 kB
  8. mod_http2-debugsource-1.15.7-10.module+el8+1792+7c1d95a2.x86_64.rpm
    MD5: f6e715dffa0a659a3a3d75d931789e3b
    SHA-256: af255511a34a21a989c214ba6db5127f55c01eb0e8e868c4a985b9299f35ca64
    Size: 148.12 kB
  9. mod_ldap-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.x86_64.rpm
    MD5: 5c0a988af7f23ce97ac7505ec467b423
    SHA-256: 571d811e717d394e227c632b092b646a1f34eaeddf8e4655a72ebaafa62e8b8b
    Size: 89.28 kB
  10. mod_md-2.0.8-8.module+el8+1792+7c1d95a2.x86_64.rpm
    MD5: 1b4c936dd176c70dfe852cc06aecd0f6
    SHA-256: cbc4043198a0028411484d94e53ffa7c11cd3023804dbe024ea6bcede9931d91
    Size: 183.62 kB
  11. mod_md-debugsource-2.0.8-8.module+el8+1792+7c1d95a2.x86_64.rpm
    MD5: bfe6e4c7ae63b802bbaaac7b1f7c1d28
    SHA-256: e4f8e317fc6fced9d06bb7c8173ed778312a9d1774ff1a7771f770dfd81a8a28
    Size: 126.24 kB
  12. mod_proxy_html-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.x86_64.rpm
    MD5: 19868088032f36d5b574a63193e9f0b8
    SHA-256: bb7521551f2ea5269ed24edf3bd1ee3e8c678aed92e4ac6c298984925edeb492
    Size: 66.42 kB
  13. mod_session-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.x86_64.rpm
    MD5: 57c392d594468067a12bb8f959eade60
    SHA-256: ab36161328db703badae3735ea3b1cb1bd51cc63bdb15550698cd399ca162d39
    Size: 78.03 kB
  14. mod_ssl-2.4.37-65.module+el8+1792+7c1d95a2.1.ML.1.x86_64.rpm
    MD5: 4c74231bb6c77da89a0a9e136bf10081
    SHA-256: c6bc68b26c97dd29c5254fe1e198495f2fdbcd89a0ec6e49a42bdb2a6ebf8fcc
    Size: 140.67 kB