stable

httpd-2.4.54-3.fc36

FEDORA-2022-e620fb15d5 created by luhliarik 9 months ago for Fedora 36
  • new version 2.4.54
  • various security fixes

How to install

sudo dnf upgrade --refresh --advisory=FEDORA-2022-e620fb15d5

This update has been submitted for testing by luhliarik.

9 months ago

This update's test gating status has been changed to 'waiting'.

9 months ago
User Icon imabug provided feedback 9 months ago
karma

This update's test gating status has been changed to 'failed'.

9 months ago

This update has been pushed to testing.

9 months ago
User Icon bojan provided feedback 9 months ago
karma
User Icon andilinux commented & provided feedback 9 months ago
karma

works

User Icon mhayden commented & provided feedback 9 months ago
karma

No issues found.

This update's test gating status has been changed to 'passed'.

9 months ago

This update can be pushed to stable now if the maintainer wishes

9 months ago
User Icon pampelmuse commented & provided feedback 9 months ago
karma

Works for me

This update has been submitted for stable by bodhi.

9 months ago

This update has been pushed to stable.

8 months ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
5
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
9 months ago
in testing
9 months ago
in stable
8 months ago
BZ#2094998 CVE-2022-26377 httpd: mod_proxy_ajp: Possible request smuggling [fedora-all]
0
0
BZ#2095003 CVE-2022-28614 httpd: out-of-bounds read via ap_rwrite() [fedora-all]
0
0
BZ#2095007 CVE-2022-28615 httpd: out-of-bounds read in ap_strcmp_match() [fedora-all]
0
0
BZ#2095013 CVE-2022-29404 httpd: mod_lua: DoS in r:parsebody [fedora-all]
0
0
BZ#2095016 CVE-2022-30522 httpd: mod_sed: DoS vulnerability [fedora-all]
0
0
BZ#2095019 CVE-2022-30556 httpd: mod_lua: Information disclosure with websockets [fedora-all]
0
0
BZ#2095021 CVE-2022-31813 httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism [fedora-all]
0
0
BZ#2099897 Can it be updated 2.4.54 to fix CISE HIGH vulnerability reports?
0
0

Automated Test Results

Test Cases

0 0 Test Case HTTPd