Bug reported
https://bugzilla.redhat.com/show_bug.cgi?id=2071554
Regards, Nikolay
On 2022-04-01 20:56, Neal Gompa wrote:
On Fri, Apr 1, 2022 at 2:55 PM Ken Dreyer kdreyer@redhat.com wrote:
RHEL 8.5 has the following fixes in the httpd package over the past couple of months:
2022-03-21 Luboš Uhliarik luhliari@redhat.com - 2.4.37-43.3
- Resolves: #2065247 - CVE-2022-22720 httpd:2.4/httpd: HTTP request smuggling
vulnerability in Apache HTTP Server 2.4.52 and earlier
2022-02-25 Luboš Uhliarik luhliari@redhat.com - 2.4.37-43.2
- Resolves: #2059256 - CVE-2021-34798 httpd:2.4/httpd: NULL pointer dereference
via malformed requests
- Resolves: #2059257 - CVE-2021-39275 httpd:2.4/httpd: out-of-bounds write in
ap_escape_quotes() via malicious input
2022-01-10 Luboš Uhliarik luhliari@redhat.com - 2.4.37-43.1
- Resolves: #2035062 - CVE-2021-44790 httpd:2.4/httpd: mod_lua: possible buffer
overflow when parsing multipart content
I don't see builds that correspond to this in https://koji.mbox.centos.org/koji/packageinfo?packageID=583 , and this URL hangs in my browser: https://git.centos.org/rpms/httpd
When should I expect these CVE fixes in CentOS 8 Stream?
Please file bugs in the Red Hat Bugzilla about this, as that's the only place that the right people will be guaranteed to see it.