Lucene search

K
rockyRockylinux Product ErrataRLSA-2023:0852
HistoryFeb 22, 2023 - 1:08 a.m.

httpd:2.4 security and bug fix update

2023-02-2201:08:53
Rockylinux Product Errata
errata.rockylinux.org
39
httpd
mod_dav
mod_proxy_ajp
cve-2006-20001
cve-2022-36760
cve-2022-37436
cvss
rocky linux 8
bug fix
bz#2165967
mod_md
mod_http2

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.023

Percentile

90.0%

An update is available for mod_http2, mod_md, httpd, module.httpd, module.mod_md, module.mod_http2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

  • httpd: mod_dav: out-of-bounds read/write of zero byte (CVE-2006-20001)

  • httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-36760)

  • httpd: mod_proxy: HTTP response splitting (CVE-2022-37436)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • httpd-init fails to create localhost.crt, localhost.key due to “sscg” default now creates a /dhparams.pem and is not idempotent if the file /dhparams.pem already exists. (BZ#2165967)

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.023

Percentile

90.0%