Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:1080: Red Hat Security Advisory: httpd:2.4 security update

An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-22720: httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
Red Hat Security Data
#vulnerability#web#linux#red_hat#apache#nodejs#js#java#kubernetes

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Red Hat Customer Portal

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2022-03-28

Updated:

2022-03-28

RHSA-2022:1080 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: httpd:2.4 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

  • httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2064321 - CVE-2022-22720 httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling

Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1

SRPM

httpd-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src.rpm

SHA-256: f434df028b843d5c4460fa3502c548600522cbe1c65d1f5763078c17ba6202f3

mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm

SHA-256: 3f4da30a587ee725ccbd0c37e7c0530983bdcdfbe80c64e8e5d8ab032b016381

ppc64le

httpd-filesystem-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch.rpm

SHA-256: b369961c8cec03988b685c509b436966c148d4b5068169e88bd9b8bc8c1f1320

httpd-manual-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch.rpm

SHA-256: ddae4e2765a5ac908f36060af74f12e506dc2bf2e0747d1eae68ebd12646b80f

httpd-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: f34c72803748d5744f43248abff273696230f4e359cc5d0d969dcdbf49775f75

httpd-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: 61dea3fe8b3313ec1956e35f9999f327cf96e7e32b70f93f0ad58490e531cfa2

httpd-debugsource-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: fc401db4283dddac20335bf78209372d7e4e71be36a5ab3e171841a596a262c6

httpd-devel-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: c404fd3b3883782501c3512114cb0b3a17d74f7bbe82fb46e1e4ad996b6f79ce

httpd-tools-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: a189f38249136b35d04b95b94ea3013be1503a822872ed0206d87dc9701ddce9

httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: bce88f9668394fe72b8c2c12780acee17ace366c9edfbabc5dd0940ebbfc4878

mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm

SHA-256: fd47cafe61d5d196a65a8e55028d400019e869aa5d2b5af964b80264d5827423

mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm

SHA-256: 099456aa25db548b8fc799fcf678f6a8d081d7baf7fd3b14996d82ea4cd695fd

mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le.rpm

SHA-256: 87e5555fec965361242c991ba2cc98acd3bebd055b37af4ebe929f819179324f

mod_ldap-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: f46fecfe34f40ed58d49ddc8790d7ea8474b2f75d0efb2a93c5fb436cb923ba9

mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: d3badb037d21a42222901c21318f73a6f57a629b8c765e626b80b51ba8be82c8

mod_md-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: 3819b98723c80880433c6d43d9642e42e1dd596d8858d2713f0f655d5433a757

mod_md-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: 6fe6e3df3c43dfd5c34f04a5fd2875c930cdbc7b694b0d25df8c9e4eb7f2d7d9

mod_proxy_html-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: 4aeb2ade7f2e6ca42a1e0a29f36ddbdc04c61fd7bf8bed4042fb58e90d48a932

mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: 1b5b44619905eb6ad2b4853af834a2a6e0ea469da964c7339b49928cf32a6e13

mod_session-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: c512d2a6b06dacce61a9e392296b605f5dccd6a4ea45857957b639b08ae1c323

mod_session-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: f0e5012ef4ae7a024a3a3bb4e0a56d90d22d1b01011af4e7ebcc4f287dec6600

mod_ssl-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: 1010348a783090c4a3face73a4d43ec459ed926e05147c6a66b125f66cecd7fe

mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le.rpm

SHA-256: a42df388c9e4fd6523f166a49d640986eb0dfde555577049bf48424fcb538841

Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1

SRPM

httpd-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src.rpm

SHA-256: f434df028b843d5c4460fa3502c548600522cbe1c65d1f5763078c17ba6202f3

mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src.rpm

SHA-256: 3f4da30a587ee725ccbd0c37e7c0530983bdcdfbe80c64e8e5d8ab032b016381

x86_64

httpd-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 48dc18a07db72234380dcfb600e2c0ca5effb2a83dabdf9b5aa26bcc73aab248

httpd-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 6133778db9f055aeb6b53fd73605c2baeba6e054dcfc62e070df7567215c516c

httpd-debugsource-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 91ff2d722e7b8c11e3967e787f9707bb859aacf93eeb35852e9f892dff4a11ce

httpd-devel-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 60da487800e55f02bcdd3c55f11375b5bf26e92c72629780a2023606a4a15544

httpd-filesystem-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch.rpm

SHA-256: b369961c8cec03988b685c509b436966c148d4b5068169e88bd9b8bc8c1f1320

httpd-manual-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch.rpm

SHA-256: ddae4e2765a5ac908f36060af74f12e506dc2bf2e0747d1eae68ebd12646b80f

httpd-tools-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: ab5ab1cb83c77597e7cd96ce1e4bffeb4b7acd675ee843cd1142da8544a51aee

httpd-tools-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 2e11e0f1c87a8b4907dc1169534eb2c3b5f00f3a60dbb912b0580c72e754fd65

mod_http2-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm

SHA-256: 845d4f36b86a4047f119eb1ace6bcee53e8b262c24c70cdd966a8487f085cadd

mod_http2-debuginfo-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm

SHA-256: e111b78d6f969969feef5ccec93d566978443bf778e1eabe4bfe103e64c20472

mod_http2-debugsource-1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64.rpm

SHA-256: c2eafac536ce65d33e50e591c0c4130647abeb527602c458850d2d02c806a808

mod_ldap-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: e70b6cca2621d25f67be4d5dfc49b6e7306643c89b1f455b7e0e199706b4a970

mod_ldap-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 3874cbf71f977228619872543badb5eb7adb68edcd27929188c29539d96f26cd

mod_md-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 799fa6cf16b3cdb8e7b95236046326675420e06792386a1d40b6ba045a558f09

mod_md-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 9d952d47b9848169f41a2435a2df819bdc990fa6b782355b811786107322c93c

mod_proxy_html-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 146050e03f86454abec3d8dd7386c7241a760f35f3b988f1666d860c1e72b9b5

mod_proxy_html-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: acc2519e46ea6f56a9390bb1fa42d82d1daed3625a90f3e474a5e8288da78ab9

mod_session-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 89a0b7b790b534564d5d77807d5a95e90c32ec8e5c4ec56a89fd03575bcf3d46

mod_session-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 9d8fc5c7b7f8fd48954eef81e0ac02a20e5fe8be6b56d21207581fee5120439a

mod_ssl-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: b9ccba995f96ec7d2abb8df021cf472d5e1327a61441f3a94384b6b4ad77290c

mod_ssl-debuginfo-2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64.rpm

SHA-256: 0e55ccffe7e72dcf71b5bd369fd236b80d24199abb775bdf23ab612abf5c4891

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update