Amazon Linux 2 Security Advisory: ALAS-2024-2532
Advisory Release Date: 2024-04-24 22:15 Pacific
Advisory Updated Date: 2024-04-24 22:15 Pacific
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.
This issue affects Apache HTTP Server: through 2.4.58. (CVE-2023-38709)
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.
Users are recommended to upgrade to version 2.4.59, which fixes this issue. (CVE-2024-24795)
Affected Packages:
httpd
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update httpd to update your system.
aarch64:
httpd-2.4.59-1.amzn2.aarch64
httpd-devel-2.4.59-1.amzn2.aarch64
httpd-tools-2.4.59-1.amzn2.aarch64
mod_ssl-2.4.59-1.amzn2.aarch64
mod_md-2.4.59-1.amzn2.aarch64
mod_proxy_html-2.4.59-1.amzn2.aarch64
mod_ldap-2.4.59-1.amzn2.aarch64
mod_session-2.4.59-1.amzn2.aarch64
httpd-debuginfo-2.4.59-1.amzn2.aarch64
i686:
httpd-2.4.59-1.amzn2.i686
httpd-devel-2.4.59-1.amzn2.i686
httpd-tools-2.4.59-1.amzn2.i686
mod_ssl-2.4.59-1.amzn2.i686
mod_md-2.4.59-1.amzn2.i686
mod_proxy_html-2.4.59-1.amzn2.i686
mod_ldap-2.4.59-1.amzn2.i686
mod_session-2.4.59-1.amzn2.i686
httpd-debuginfo-2.4.59-1.amzn2.i686
noarch:
httpd-manual-2.4.59-1.amzn2.noarch
httpd-filesystem-2.4.59-1.amzn2.noarch
src:
httpd-2.4.59-1.amzn2.src
x86_64:
httpd-2.4.59-1.amzn2.x86_64
httpd-devel-2.4.59-1.amzn2.x86_64
httpd-tools-2.4.59-1.amzn2.x86_64
mod_ssl-2.4.59-1.amzn2.x86_64
mod_md-2.4.59-1.amzn2.x86_64
mod_proxy_html-2.4.59-1.amzn2.x86_64
mod_ldap-2.4.59-1.amzn2.x86_64
mod_session-2.4.59-1.amzn2.x86_64
httpd-debuginfo-2.4.59-1.amzn2.x86_64