The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
httpd: modproxyajp: Possible request smuggling (CVE-2022-26377)
httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
httpd: Out-of-bounds read in apstrcmpmatch() (CVE-2022-28615)
httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.