Rocky Linux 766 Published by

A httpd:2.4 security update has been released for Rocky Linux 8.



RLSA-2022:5163 Low: httpd:2.4 security update


Name:
RLSA-2022:5163

Synopsis:
Low: httpd:2.4 security update

Severity:
Low

Topic:
An update for the httpd:2.4 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description:
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected products:
  • Rocky Linux 8
Publish date:
2022-07-07

RPMS:
  • httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.src.rpm
  • httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • httpd-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • httpd-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • httpd-debugsource-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • httpd-debugsource-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • httpd-filesystem-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm
  • httpd-manual-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm
  • httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • httpd-tools-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • httpd-tools-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm
  • mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.src.rpm
  • mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
  • mod_http2-debuginfo-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm
  • mod_http2-debuginfo-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
  • mod_http2-debugsource-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm
  • mod_http2-debugsource-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
  • mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • mod_ldap-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • mod_ldap-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm
  • mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.src.rpm
  • mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
  • mod_md-debuginfo-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm
  • mod_md-debuginfo-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
  • mod_md-debugsource-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm
  • mod_md-debugsource-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
  • mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • mod_proxy_html-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • mod_proxy_html-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • mod_session-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • mod_session-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
  • mod_ssl-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm
  • mod_ssl-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm