Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 04 Jul 2024 16:08:55 +0000
From:      bugzilla-noreply@freebsd.org
To:        apache@FreeBSD.org
Subject:   maintainer-feedback requested: [Bug 280130] www/apache24: Security Update to 2.4.61
Message-ID:  <bug-280130-16115-up7IboGCSq@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-280130-16115@https.bugs.freebsd.org/bugzilla/>
References:  <bug-280130-16115@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
Bugzilla Automation <bugzilla@FreeBSD.org> has asked freebsd-apache (Nobody)
<apache@FreeBSD.org> for maintainer-feedback:
Bug 280130: www/apache24: Security Update to 2.4.61
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D280130



--- Description ---
Posting through announce@httpd.apache.org mailing list yesterday:
"Apache HTTP Server 2.4.61 Released"
https://lists.apache.org/thread/wz5hkj1lsptlv431rdn0gs8jvt5ol519

and out of https://downloads.apache.org/httpd/CHANGES_2.4:

Changes with Apache 2.4.61

  *) SECURITY: CVE-2024-39884: Apache HTTP Server: source code
     disclosure with handlers configured via AddType (cve.mitre.org)
     A regression in the core of Apache HTTP Server 2.4.60 ignores
     some use of the legacy content-type based configuration of
     handlers.	 "AddType" and similar configuration, under some
     circumstances where files are requested indirectly, result in
     source code disclosure of local content. For example, PHP
     scripts may be served instead of interpreted.
     Users are recommended to upgrade to version 2.4.61, which fixes
     this issue.

This should fix the problem reported in bug #280077.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-280130-16115-up7IboGCSq>