Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:0891: Red Hat Security Advisory: httpd:2.4 security update

An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2021-34798: httpd: NULL pointer dereference via malformed requests
  • CVE-2021-39275: httpd: Out-of-bounds write in ap_escape_quotes() via malicious input
Red Hat Security Data
#vulnerability#web#linux#red_hat#apache

Synopsis

Moderate: httpd:2.4 security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

  • httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)
  • httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2005119 - CVE-2021-39275 httpd: Out-of-bounds write in ap_escape_quotes() via malicious input
  • BZ - 2005128 - CVE-2021-34798 httpd: NULL pointer dereference via malformed requests

Red Hat Enterprise Linux for x86_64 8

SRPM

httpd-2.4.37-43.module+el8.5.0+14370+51c6d843.2.src.rpm

SHA-256: 521a23f9f2a50bd676633e2d011f63f3d26dcb8b27980d66bfd93554a17e7fa0

mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm

SHA-256: 45b5279fe41fb178acbda8208624ee5115215b710d7884ac00ed2636d56b4565

mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm

SHA-256: e54d2c1123b7e139e6d8e896309ff1210bc3e70b6d53debd525c825694e60964

x86_64

httpd-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: 5358562d4bed3783d28588628f490d29dc766bdb859e5695a5e35b938443f2e0

httpd-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: 3e7152569da44044512348b2e709c73c2043d47282b2669b77f6aa3bba0a2b9d

httpd-debugsource-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: 3d25addbb5305e5025e131196ef298890f69f4d2e52d631f56f4723982eabe4c

httpd-devel-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: 64d85d117f5ec2d2f13717f76e9a9133c2d7e809847cb9c14f38961b0e710cf9

httpd-filesystem-2.4.37-43.module+el8.5.0+14370+51c6d843.2.noarch.rpm

SHA-256: 7553f0dddaf968f4da12042b15bf7a7acb0096f1b3ca132b95602257a0b89441

httpd-manual-2.4.37-43.module+el8.5.0+14370+51c6d843.2.noarch.rpm

SHA-256: 4145819786ecbf247781a7e0d597d2dd4f56f7358afe53ead090f0c6022058c7

httpd-tools-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: 72109db23efcc373ba6ae533d9f96c5efb6aa6a66539235392dd9303bf0f3ed4

httpd-tools-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: 88c7d2f409b5f2e18e9d3920e51dc862bbb9f63db7246df18b0f1745144f91a3

mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm

SHA-256: 74a98b837af5a8eda3372e8121361ad1d42b6da8b1077f50d8da327acc78793b

mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm

SHA-256: 0db24201b1b5b60fd95802368fc55377826f19995e11eefee6ba49f230aacdb3

mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64.rpm

SHA-256: b1fcafcc79736a1eb98548f78198c96d7e394636c5474d845ec5d5c99e6e002e

mod_ldap-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: ab5628fc28d7e6565082bf02a3acb31f73a319151f70dbb75c9e762ded4f4383

mod_ldap-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: d5ceaef10b7e7ffdc62f77bb6043f4e68a1f41c008140fee2992f401190c9853

mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm

SHA-256: f3724d9ba0b48c114b5de211569dee948c12fb3d51651769787ba7c6fbf328e2

mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm

SHA-256: f6b94cade41a730ccd7cbc1d1ee2e2053640dc93e687f1d513317ccc3a5089a9

mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64.rpm

SHA-256: 88894d76e297120cfea5b52686fbf0d7e0e3ac6e45feb6e5d8cb9c39a8bed53c

mod_proxy_html-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: 640d210103c6326048a876a2438b157c678ce1f1a3ad5d1d42af7eb388621ddb

mod_proxy_html-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: 243f3847c0c6b1ce26a98282e7bcbe92d453b850179e62f767d3428ad58335e9

mod_session-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: c9bb8eb2077644b6adc71e9914f41796e1380e488cd6e8118ae0bd2bb9dd9139

mod_session-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: b0308b59a64e6e438521513a65be138554cc89fb1b5419315da017cd902520ad

mod_ssl-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: 21722d959b352fc54561a06e88c3589de16f1509e4d58498022b6c84330237c7

mod_ssl-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.x86_64.rpm

SHA-256: cb1fccd4278bb195f53696788b8cfb84fd100dbb0ba06ee5cfd8da281b0d316f

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

httpd-2.4.37-43.module+el8.5.0+14370+51c6d843.2.src.rpm

SHA-256: 521a23f9f2a50bd676633e2d011f63f3d26dcb8b27980d66bfd93554a17e7fa0

mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm

SHA-256: 45b5279fe41fb178acbda8208624ee5115215b710d7884ac00ed2636d56b4565

mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm

SHA-256: e54d2c1123b7e139e6d8e896309ff1210bc3e70b6d53debd525c825694e60964

s390x

httpd-filesystem-2.4.37-43.module+el8.5.0+14370+51c6d843.2.noarch.rpm

SHA-256: 7553f0dddaf968f4da12042b15bf7a7acb0096f1b3ca132b95602257a0b89441

httpd-manual-2.4.37-43.module+el8.5.0+14370+51c6d843.2.noarch.rpm

SHA-256: 4145819786ecbf247781a7e0d597d2dd4f56f7358afe53ead090f0c6022058c7

httpd-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: 6df580377ab8b9d8917ec7fa3dfbaa7013593fbe31baad485e4320b6fec20139

httpd-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: 986aba6ac143d7485e40af7990e3afbf13f9bbda9f0410badf1a532193fe6c69

httpd-debugsource-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: d3ba6efeb7fbeeb70d5d839a0ea6dc23abbb3d395d08508a0a4ddc4896ec32ba

httpd-devel-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: d081bcda22d9e8ed9c673f8f12594d95e283550d038c51a798e7305dff44a02f

httpd-tools-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: 7e056af43632df88c6ba1c20262d9b2acafb229f13d48b5d678bf071e01f0968

httpd-tools-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: c87a12686438ee90e92a75d83c6b24cb3c1312d8b2fe31cfea5072aad9b0a994

mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm

SHA-256: 801e1a41ea2ff804108f4767c56d0d3fcb8f974d90afc1c84e926fdee4ee202e

mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm

SHA-256: c93bfa1c5e5b5431091f96630e73650d6c12745e49c1c54f8f2900f1e445be5a

mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.s390x.rpm

SHA-256: b0ac2eaf5baf8bf30f53be826519b258bc65010d58cde738b6a1f8f614811e07

mod_ldap-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: 283bc6baa8eb0bc979d8c23db0e5b27e3fb376013c4af62bf3f6a266bc65c498

mod_ldap-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: 16d9e1f815a3b8b3a1407086544866490617cbeb6efd6b681b54f8714974c2c8

mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm

SHA-256: e6bdec26d5ac3c27f7e1ed5cf7cfff31a5aeac61307aac743adf516672294417

mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm

SHA-256: aec3f53bef91ae21def38a03da165cc8c0de0c8230820131b489c746982a422d

mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.s390x.rpm

SHA-256: d6741dabe3ea8db818a220f80af8c088b4fea295e0aa41b666acefc7f8527500

mod_proxy_html-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: 79c2ec0d48e1e916374accf3ed1a40fdaea99a6b23ec851e0a9cea4fada665e4

mod_proxy_html-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: cee30ed8132d0ace5a8edd9097e58b1d6058b07d75a9ea2b8352b927aaefd906

mod_session-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: 2592df8a623cff0a60713a294270662614903da835eb18276b1593225b375851

mod_session-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: d0ba4ec11fd7522c3b18ea0b33f9e44d1d966f2009f1bf7c5cf707917bebf44f

mod_ssl-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: 286abf5c617c1356c6ec69d1fc119e0dee0aea70176ad9b0c6c4c76533ccab8b

mod_ssl-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.s390x.rpm

SHA-256: 458bcb367e977b80b556879902e8d37b149915825299da85ef7655c8124bb0c8

Red Hat Enterprise Linux for Power, little endian 8

SRPM

httpd-2.4.37-43.module+el8.5.0+14370+51c6d843.2.src.rpm

SHA-256: 521a23f9f2a50bd676633e2d011f63f3d26dcb8b27980d66bfd93554a17e7fa0

mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm

SHA-256: 45b5279fe41fb178acbda8208624ee5115215b710d7884ac00ed2636d56b4565

mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm

SHA-256: e54d2c1123b7e139e6d8e896309ff1210bc3e70b6d53debd525c825694e60964

ppc64le

httpd-filesystem-2.4.37-43.module+el8.5.0+14370+51c6d843.2.noarch.rpm

SHA-256: 7553f0dddaf968f4da12042b15bf7a7acb0096f1b3ca132b95602257a0b89441

httpd-manual-2.4.37-43.module+el8.5.0+14370+51c6d843.2.noarch.rpm

SHA-256: 4145819786ecbf247781a7e0d597d2dd4f56f7358afe53ead090f0c6022058c7

httpd-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: a9b5746fcde683c898722020f6688497be08dc51e03601b5159b6fca2289d014

httpd-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: fea0b10eff1b5c58059e4b94c928ce80259e4c2c496749ffed11ee95f79d2ee3

httpd-debugsource-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: b9f45b78a03638644f2797de427ba40d1e4e4a1e99714d6503d3c0cb74a0d961

httpd-devel-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: ec65978882bbe530d90dbc6010adeae3543377a9d74f6998c1231d3bfd91a013

httpd-tools-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: ec37a1d3363a07a52b609526d5b0c9559d17f4ff412f66c361f3371e1b976523

httpd-tools-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: bec199850dc5b35b3a6f06627a656765d58043daeaaa7aa965499b9e25283f1e

mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm

SHA-256: 4a7b694345f8633c99b1d80cea19ebd4d0ef11539c20ed6569f87bc0fd92059c

mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm

SHA-256: 0f9a4200c5110bd7cfb91d942bdae442625d2d79c56d35cd252dc6f361f12521

mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le.rpm

SHA-256: fa81fdce597283e6cecbfc618856a2b1160b5091c7948357eaaa8cb509cdb69e

mod_ldap-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: f7b5a6819fea4463efd381aa7af15a50f1bacee53d2bfd0063e3b8bcf3b88041

mod_ldap-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: 4284aa7d47b6e14f52dcbbede75723bc7ddad5d3940ead8a02c4ac55c79e1598

mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm

SHA-256: 97e5a010aa4425df62b3e5cab8094c32c36242c40ce181a44809477ef3539d62

mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm

SHA-256: 1ba4f52abc03c57ea7d4484c65459b39543e5cfb82c65174bce81e1b8288f8ad

mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le.rpm

SHA-256: 38f2fc7066bbce386bcf68652a3c50cb908a67c52652d50d104be0cd881b66c3

mod_proxy_html-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: 4b8010136dfc26c85300f3efa4e1e9448f3df6e449d89f1d3551b987bd551009

mod_proxy_html-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: b4b0c00ec9365e419bc2df847d5f40943c8c88ecfcce31ade5061f72f4d19416

mod_session-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: 587125d7c063189e075cd2668fb1ef00ca894673bdfa1c8498f5a59786d69226

mod_session-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: be9fa49637843e340c778d7d35520410cb08677f1f23392a7c3450059f2bd981

mod_ssl-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: a8e2751e16bb78765db2780c6b3a11a0f3f6da8666498a922a3083fb2ed8ef11

mod_ssl-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.ppc64le.rpm

SHA-256: 41f2b89f77cc5a097cc0039f8116c80f4bf3bdc5e1c2ac18588a9023df24be20

Red Hat Enterprise Linux for ARM 64 8

SRPM

httpd-2.4.37-43.module+el8.5.0+14370+51c6d843.2.src.rpm

SHA-256: 521a23f9f2a50bd676633e2d011f63f3d26dcb8b27980d66bfd93554a17e7fa0

mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.src.rpm

SHA-256: 45b5279fe41fb178acbda8208624ee5115215b710d7884ac00ed2636d56b4565

mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.src.rpm

SHA-256: e54d2c1123b7e139e6d8e896309ff1210bc3e70b6d53debd525c825694e60964

aarch64

httpd-filesystem-2.4.37-43.module+el8.5.0+14370+51c6d843.2.noarch.rpm

SHA-256: 7553f0dddaf968f4da12042b15bf7a7acb0096f1b3ca132b95602257a0b89441

httpd-manual-2.4.37-43.module+el8.5.0+14370+51c6d843.2.noarch.rpm

SHA-256: 4145819786ecbf247781a7e0d597d2dd4f56f7358afe53ead090f0c6022058c7

httpd-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: 967b11dd2ec12ee97b541bd4437c989c20be45b41e15e9ec9f57bee04b5bca51

httpd-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: 65765c0478989118897dbcaa91be061466c72541ffb6bf45db6c5010c9a10d95

httpd-debugsource-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: f6d9a835609ba291aeca8bf139de3d104eb19ac07c183270e320f611acc319f2

httpd-devel-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: 8541220e9b54b00f4d61fe1d398af4dd59e1f03df07cab1e341493f93ac1aca6

httpd-tools-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: d38f0751360c5ce8c62fc0ae5a1c095ee6cc7bca486f413eccb756f7c39bdab0

httpd-tools-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: 84c7c4bc6d5bba87047e4c89616a4e3317c8c5c259625643becbdbd844eb7086

mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm

SHA-256: bf1093dd1892227db4dbcd1d46b576a2a9429827f412510ac2afa339f25c18f2

mod_http2-debuginfo-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm

SHA-256: 2e1a315f03cf7376a2175d878f287d21d8c89d6df9dfaf4ebd40a222c6bbc01e

mod_http2-debugsource-1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64.rpm

SHA-256: 184bc43ae20d5a865167203f1e4cd20925317659231fcc4401746289c7ab1ca1

mod_ldap-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: 46c7305cd18613432bf6976a7bce9d6bdf8970c1230e7796402b26f20556e5c4

mod_ldap-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: e715a274d5e31fed386c2e4e5ef21c5a10ae6fdf50209304fd8ba3c623874f98

mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm

SHA-256: 396ffce00fa11237b343330f48ce215ed3123c8d520f4e53fc29c7cb9d03edfa

mod_md-debuginfo-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm

SHA-256: 031e3abd81f2e03b8dab9af402139c6565db2cc61878018a343f20949f1e6da2

mod_md-debugsource-2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64.rpm

SHA-256: ab5fc429e251fd16d0aab83d4853aabf99624ebeb84a09a8dce7ef977be0633c

mod_proxy_html-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: 72c9293dedc713d16a305bf85812667d46447a6bc2f97dd933c01b356e5e74da

mod_proxy_html-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: 35cd523628f55fa621f8c2ea4453b3fa9b3d4e33453196e0effbb1e2b48842d3

mod_session-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: d3c4307bc0f25f5e76342abdc1b2dc35d17987cedbc5d1064b00e953802d8c3c

mod_session-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: 36ff676643e3b726157ee803227a152c45c4ff4c94f1e140e367b9e7203dc86b

mod_ssl-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: acc18fef6ddaf53c989701b4e4c2318d453105d30717c7ab89ce540ce34e4172

mod_ssl-debuginfo-2.4.37-43.module+el8.5.0+14370+51c6d843.2.aarch64.rpm

SHA-256: f893028b125b1c80918d8cbec37faced92c191a8a9ebdb0c113ff7bceaacebc1

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update