vulnerability

Rocky Linux: CVE-2023-38709: httpd (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
2024-04-04
Added
2024-07-03
Modified
2025-03-18

Description

Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.

This issue affects Apache HTTP Server: through 2.4.58.

Solution(s)

rocky-upgrade-httpdrocky-upgrade-httpd-corerocky-upgrade-httpd-core-debuginforocky-upgrade-httpd-debuginforocky-upgrade-httpd-debugsourcerocky-upgrade-httpd-develrocky-upgrade-httpd-toolsrocky-upgrade-httpd-tools-debuginforocky-upgrade-mod_http2rocky-upgrade-mod_http2-debuginforocky-upgrade-mod_http2-debugsourcerocky-upgrade-mod_ldaprocky-upgrade-mod_ldap-debuginforocky-upgrade-mod_luarocky-upgrade-mod_lua-debuginforocky-upgrade-mod_mdrocky-upgrade-mod_md-debuginforocky-upgrade-mod_md-debugsourcerocky-upgrade-mod_proxy_htmlrocky-upgrade-mod_proxy_html-debuginforocky-upgrade-mod_sessionrocky-upgrade-mod_session-debuginforocky-upgrade-mod_sslrocky-upgrade-mod_ssl-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.