Date: Thu, 04 Jul 2024 16:08:55 +0000 From: bugzilla-noreply@freebsd.org To: apache@FreeBSD.org Subject: maintainer-feedback requested: [Bug 280130] www/apache24: Security Update to 2.4.61 Message-ID: <bug-280130-16115-up7IboGCSq@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-280130-16115@https.bugs.freebsd.org/bugzilla/> References: <bug-280130-16115@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
Bugzilla Automation <bugzilla@FreeBSD.org> has asked freebsd-apache (Nobody) <apache@FreeBSD.org> for maintainer-feedback: Bug 280130: www/apache24: Security Update to 2.4.61 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D280130 --- Description --- Posting through announce@httpd.apache.org mailing list yesterday: "Apache HTTP Server 2.4.61 Released" https://lists.apache.org/thread/wz5hkj1lsptlv431rdn0gs8jvt5ol519 and out of https://downloads.apache.org/httpd/CHANGES_2.4: Changes with Apache 2.4.61 *) SECURITY: CVE-2024-39884: Apache HTTP Server: source code disclosure with handlers configured via AddType (cve.mitre.org) A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.61, which fixes this issue. This should fix the problem reported in bug #280077.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-280130-16115-up7IboGCSq>