Slackware alert SSA:2025-338-01 (httpd)
| From: | Slackware Security Team <security@slackware.com> | |
| To: | slackware-security@slackware.com | |
| Subject: | [slackware-security] httpd (SSA:2025-338-01) | |
| Date: | Thu, 04 Dec 2025 14:33:35 -0800 | |
| Message-ID: | <alpine.LNX.2.02.2512041433080.19326@connie.slackware.com> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] httpd (SSA:2025-338-01) New httpd packages are available for Slackware 15.0 and -current to fix security issues. Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/httpd-2.4.66-i586-1_slack15.0.txz: Upgraded. This release fixes bugs and the following security issues: mod_userdir+suexec bypass via AllowOverride FileInfo. CGI environment variable override. NTLM Leakage on Windows through UNC SSRF. Server Side Includes adds query string to #exec cmd=... mod_md (ACME), unintended retry intervals. For more information, see: https://downloads.apache.org/httpd/CHANGES_2.4.66 https://www.cve.org/CVERecord?id=CVE-2025-66200 https://www.cve.org/CVERecord?id=CVE-2025-65082 https://www.cve.org/CVERecord?id=CVE-2025-59775 https://www.cve.org/CVERecord?id=CVE-2025-58098 https://www.cve.org/CVERecord?id=CVE-2025-55753 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 15.0: ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patc... Updated package for Slackware x86_64 15.0: ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/pa... Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/s... Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current... MD5 signatures: +-------------+ Slackware 15.0 package: 20e1b1b8816f80a516397fee255a16f8 httpd-2.4.66-i586-1_slack15.0.txz Slackware x86_64 15.0 package: c51ceeac514d409cb6befe6d94af2a1a httpd-2.4.66-x86_64-1_slack15.0.txz Slackware -current package: 64868bc16927fb0431ab2dc8f968d9e6 n/httpd-2.4.66-i686-1.txz Slackware x86_64 -current package: 4948bd06e3629f4b498eb727afde2356 n/httpd-2.4.66-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg httpd-2.4.66-i586-1_slack15.0.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iHkEARECADkWIQTsVknaQB4iq/pnNu9qRGPAQBAiMwUCaTIKGRsUgAAAAAAEAA5t YW51MiwyLjUrMS4xMSwyLDIACgkQakRjwEAQIjNVrACfUWKr2UoMjZQ+9poe1QvX 09Pbr60AnjsHo7Y0VOsMevnqn8E3cDrIbCjd =pI9W -----END PGP SIGNATURE-----
