An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_dav: out-of-bounds read/write of zero byte (CVE-2006-20001) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-36760) * httpd: mod_proxy: HTTP response splitting (CVE-2022-37436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * httpd-init fails to create localhost.crt, localhost.key due to "sscg" default now creates a /dhparams.pem and is not idempotent if the file /dhparams.pem already exists. (BZ#2165975)
httpd-0:2.4.53-7.el9_1.1.aarch64.rpm
httpd-0:2.4.53-7.el9_1.1.ppc64le.rpm
httpd-0:2.4.53-7.el9_1.1.s390x.rpm
httpd-0:2.4.53-7.el9_1.1.src.rpm
httpd-0:2.4.53-7.el9_1.1.x86_64.rpm
httpd-core-0:2.4.53-7.el9_1.1.aarch64.rpm
httpd-core-0:2.4.53-7.el9_1.1.ppc64le.rpm
httpd-core-0:2.4.53-7.el9_1.1.s390x.rpm
httpd-core-0:2.4.53-7.el9_1.1.x86_64.rpm
httpd-core-debuginfo-0:2.4.53-7.el9_1.1.aarch64.rpm
httpd-core-debuginfo-0:2.4.53-7.el9_1.1.ppc64le.rpm
httpd-core-debuginfo-0:2.4.53-7.el9_1.1.s390x.rpm
httpd-core-debuginfo-0:2.4.53-7.el9_1.1.x86_64.rpm
httpd-debuginfo-0:2.4.53-7.el9_1.1.aarch64.rpm
httpd-debuginfo-0:2.4.53-7.el9_1.1.ppc64le.rpm
httpd-debuginfo-0:2.4.53-7.el9_1.1.s390x.rpm
httpd-debuginfo-0:2.4.53-7.el9_1.1.x86_64.rpm
httpd-debugsource-0:2.4.53-7.el9_1.1.aarch64.rpm
httpd-debugsource-0:2.4.53-7.el9_1.1.ppc64le.rpm
httpd-debugsource-0:2.4.53-7.el9_1.1.s390x.rpm
httpd-debugsource-0:2.4.53-7.el9_1.1.x86_64.rpm
httpd-devel-0:2.4.53-7.el9_1.1.aarch64.rpm
httpd-devel-0:2.4.53-7.el9_1.1.ppc64le.rpm
httpd-devel-0:2.4.53-7.el9_1.1.s390x.rpm
httpd-devel-0:2.4.53-7.el9_1.1.x86_64.rpm
httpd-filesystem-0:2.4.53-7.el9_1.1.noarch.rpm
httpd-manual-0:2.4.53-7.el9_1.1.noarch.rpm
httpd-tools-0:2.4.53-7.el9_1.1.aarch64.rpm
httpd-tools-0:2.4.53-7.el9_1.1.ppc64le.rpm
httpd-tools-0:2.4.53-7.el9_1.1.s390x.rpm
httpd-tools-0:2.4.53-7.el9_1.1.x86_64.rpm
httpd-tools-debuginfo-0:2.4.53-7.el9_1.1.aarch64.rpm
httpd-tools-debuginfo-0:2.4.53-7.el9_1.1.ppc64le.rpm
httpd-tools-debuginfo-0:2.4.53-7.el9_1.1.s390x.rpm
httpd-tools-debuginfo-0:2.4.53-7.el9_1.1.x86_64.rpm
mod_ldap-0:2.4.53-7.el9_1.1.aarch64.rpm
mod_ldap-0:2.4.53-7.el9_1.1.ppc64le.rpm
mod_ldap-0:2.4.53-7.el9_1.1.s390x.rpm
mod_ldap-0:2.4.53-7.el9_1.1.x86_64.rpm
mod_ldap-debuginfo-0:2.4.53-7.el9_1.1.aarch64.rpm
mod_ldap-debuginfo-0:2.4.53-7.el9_1.1.ppc64le.rpm
mod_ldap-debuginfo-0:2.4.53-7.el9_1.1.s390x.rpm
mod_ldap-debuginfo-0:2.4.53-7.el9_1.1.x86_64.rpm
mod_lua-0:2.4.53-7.el9_1.1.aarch64.rpm
mod_lua-0:2.4.53-7.el9_1.1.ppc64le.rpm
mod_lua-0:2.4.53-7.el9_1.1.s390x.rpm
mod_lua-0:2.4.53-7.el9_1.1.x86_64.rpm
mod_lua-debuginfo-0:2.4.53-7.el9_1.1.aarch64.rpm
mod_lua-debuginfo-0:2.4.53-7.el9_1.1.ppc64le.rpm
mod_lua-debuginfo-0:2.4.53-7.el9_1.1.s390x.rpm
mod_lua-debuginfo-0:2.4.53-7.el9_1.1.x86_64.rpm
mod_proxy_html-1:2.4.53-7.el9_1.1.aarch64.rpm
mod_proxy_html-1:2.4.53-7.el9_1.1.ppc64le.rpm
mod_proxy_html-1:2.4.53-7.el9_1.1.s390x.rpm
mod_proxy_html-1:2.4.53-7.el9_1.1.x86_64.rpm
mod_proxy_html-debuginfo-1:2.4.53-7.el9_1.1.aarch64.rpm
mod_proxy_html-debuginfo-1:2.4.53-7.el9_1.1.ppc64le.rpm
mod_proxy_html-debuginfo-1:2.4.53-7.el9_1.1.s390x.rpm
mod_proxy_html-debuginfo-1:2.4.53-7.el9_1.1.x86_64.rpm
mod_session-0:2.4.53-7.el9_1.1.aarch64.rpm
mod_session-0:2.4.53-7.el9_1.1.ppc64le.rpm
mod_session-0:2.4.53-7.el9_1.1.s390x.rpm
mod_session-0:2.4.53-7.el9_1.1.x86_64.rpm
mod_session-debuginfo-0:2.4.53-7.el9_1.1.aarch64.rpm
mod_session-debuginfo-0:2.4.53-7.el9_1.1.ppc64le.rpm
mod_session-debuginfo-0:2.4.53-7.el9_1.1.s390x.rpm
mod_session-debuginfo-0:2.4.53-7.el9_1.1.x86_64.rpm
mod_ssl-1:2.4.53-7.el9_1.1.aarch64.rpm
mod_ssl-1:2.4.53-7.el9_1.1.ppc64le.rpm
mod_ssl-1:2.4.53-7.el9_1.1.s390x.rpm
mod_ssl-1:2.4.53-7.el9_1.1.x86_64.rpm
mod_ssl-debuginfo-1:2.4.53-7.el9_1.1.aarch64.rpm
mod_ssl-debuginfo-1:2.4.53-7.el9_1.1.ppc64le.rpm
mod_ssl-debuginfo-1:2.4.53-7.el9_1.1.s390x.rpm
mod_ssl-debuginfo-1:2.4.53-7.el9_1.1.x86_64.rpm
No References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
https://bugzilla.redhat.com/show_bug.cgi?id=2161773
https://bugzilla.redhat.com/show_bug.cgi?id=2161774
https://bugzilla.redhat.com/show_bug.cgi?id=2161777