A httpd:2.4 security update has been released for Rocky Linux 8.
RLSA-2022:5163 Low: httpd:2.4 security update
Name:
RLSA-2022:5163
Synopsis:
Low: httpd:2.4 security update
Severity:
Low
Topic:
An update for the httpd:2.4 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description:
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected products:Publish date:
- Rocky Linux 8
2022-07-07
RPMS:
- httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.src.rpm
- httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- httpd-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- httpd-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- httpd-debugsource-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- httpd-debugsource-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- httpd-filesystem-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm
- httpd-manual-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm
- httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- httpd-tools-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- httpd-tools-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm
- mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.src.rpm
- mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
- mod_http2-debuginfo-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm
- mod_http2-debuginfo-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
- mod_http2-debugsource-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm
- mod_http2-debugsource-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
- mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- mod_ldap-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- mod_ldap-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm
- mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.src.rpm
- mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
- mod_md-debuginfo-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm
- mod_md-debuginfo-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
- mod_md-debugsource-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm
- mod_md-debugsource-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
- mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- mod_proxy_html-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- mod_proxy_html-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- mod_session-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- mod_session-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
- mod_ssl-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
- mod_ssl-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm