CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
97.1%
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)
Security Fix(es):
httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
rocky | 9 | aarch64 | httpd | < 2.4.53-7.el9 | httpd-0:2.4.53-7.el9.aarch64.rpm |
rocky | 9 | ppc64le | httpd | < 2.4.53-7.el9 | httpd-0:2.4.53-7.el9.ppc64le.rpm |
rocky | 9 | s390x | httpd | < 2.4.53-7.el9 | httpd-0:2.4.53-7.el9.s390x.rpm |
rocky | 9 | x86_64 | httpd | < 2.4.53-7.el9 | httpd-0:2.4.53-7.el9.x86_64.rpm |
rocky | 9 | aarch64 | httpd-core | < 2.4.53-7.el9 | httpd-core-0:2.4.53-7.el9.aarch64.rpm |
rocky | 9 | ppc64le | httpd-core | < 2.4.53-7.el9 | httpd-core-0:2.4.53-7.el9.ppc64le.rpm |
rocky | 9 | s390x | httpd-core | < 2.4.53-7.el9 | httpd-core-0:2.4.53-7.el9.s390x.rpm |
rocky | 9 | x86_64 | httpd-core | < 2.4.53-7.el9 | httpd-core-0:2.4.53-7.el9.x86_64.rpm |
rocky | 9 | aarch64 | httpd-core-debuginfo | < 2.4.53-7.el9 | httpd-core-debuginfo-0:2.4.53-7.el9.aarch64.rpm |
rocky | 9 | ppc64le | httpd-core-debuginfo | < 2.4.53-7.el9 | httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
97.1%