\{'type': 'Security', 'shortCode': 'RL', 'name': 'RLSA-2022:5163', 'synopsis': 'Low: httpd:2.4 security update', 'severity': 'Low', 'topic': 'An update for the httpd:2.4 module is now available for Rocky Linux 8.\nRocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.', 'description': 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', 'solution': None, 'affectedProducts': ['Rocky Linux 8'], 'fixes': ['1966738'], 'cves': ['Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13950.json:::CVE-2020-13950'], 'references': [], 'publishedAt': '2022-07-07T20:12:43.952918Z', 'rpms': ['httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.src.rpm', 'httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'httpd-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'httpd-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'httpd-debugsource-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'httpd-debugsource-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'httpd-filesystem-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm', 'httpd-manual-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm', 'httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'httpd-tools-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'httpd-tools-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm', 'mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.src.rpm', 'mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm', 'mod_http2-debuginfo-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm', 'mod_http2-debuginfo-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm', 'mod_http2-debugsource-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm', 'mod_http2-debugsource-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm', 'mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'mod_ldap-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'mod_ldap-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm', 'mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.src.rpm', 'mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm', 'mod_md-debuginfo-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm', 'mod_md-debuginfo-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm', 'mod_md-debugsource-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm', 'mod_md-debugsource-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm', 'mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'mod_proxy_html-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'mod_proxy_html-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'mod_session-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'mod_session-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm', 'mod_ssl-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm', 'mod_ssl-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm']}\

Rocky Linux: RLSA-2022:5163 httpd

September 2, 2022
An update for the httpd:2.4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low

Summary

An update for the httpd:2.4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.src.rpm

httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

httpd-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

httpd-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

httpd-debugsource-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

httpd-debugsource-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

httpd-filesystem-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm

httpd-manual-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm

httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

httpd-tools-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

httpd-tools-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm

mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.src.rpm

mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm

mod_http2-debuginfo-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm

mod_http2-debuginfo-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm

mod_http2-debugsource-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm

mod_http2-debugsource-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm

mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

mod_ldap-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

mod_ldap-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm

mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.src.rpm

mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm

mod_md-debuginfo-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm

mod_md-debuginfo-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm

mod_md-debugsource-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm

mod_md-debugsource-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm

mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

mod_proxy_html-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

mod_proxy_html-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

mod_session-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

mod_session-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

mod_ssl-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm

mod_ssl-debuginfo-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13950.json

Severity
Name: RLSA-2022:5163
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=


Related News