Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2022:7143 - Security Advisory
Issued:
2022-10-26
Updated:
2022-10-26

RHSA-2022:7143 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update is now available for Red Hat JBoss Core Services.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.

This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

Security Fix(es):

  • expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)
  • expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236)
  • expat: Integer overflow in storeRawNames() (CVE-2022-25315)
  • httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)
  • httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)
  • httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
  • httpd: NULL pointer dereference via crafted request during HTTP/2 request processing (CVE-2021-41524)
  • httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)
  • expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960)
  • expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)
  • expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)
  • expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)
  • expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)
  • expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)
  • expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)
  • expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)
  • expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852)
  • expat: stack exhaustion in doctype parsing (CVE-2022-25313)
  • expat: integer overflow in copyString() (CVE-2022-25314)
  • expat: integer overflow in the doProlog function (CVE-2022-23990)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Applications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.

Affected Products

  • Red Hat JBoss Core Services 1 for RHEL 8 x86_64
  • Red Hat JBoss Core Services 1 for RHEL 7 x86_64

Fixes

  • BZ - 1966728 - CVE-2021-33193 httpd: Request splitting via HTTP/2 method injection and mod_proxy
  • BZ - 2005119 - CVE-2021-39275 httpd: Out-of-bounds write in ap_escape_quotes() via malicious input
  • BZ - 2005124 - CVE-2021-36160 httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path
  • BZ - 2010934 - CVE-2021-41524 httpd: NULL pointer dereference via crafted request during HTTP/2 request processing
  • BZ - 2034672 - CVE-2021-44224 httpd: possible NULL dereference or SSRF in forward proxy configurations
  • BZ - 2044451 - CVE-2021-45960 expat: Large number of prefixed XML attributes on a single tag can crash libexpat
  • BZ - 2044455 - CVE-2021-46143 expat: Integer overflow in doProlog in xmlparse.c
  • BZ - 2044457 - CVE-2022-22822 expat: Integer overflow in addBinding in xmlparse.c
  • BZ - 2044464 - CVE-2022-22823 expat: Integer overflow in build_model in xmlparse.c
  • BZ - 2044467 - CVE-2022-22824 expat: Integer overflow in defineAttribute in xmlparse.c
  • BZ - 2044479 - CVE-2022-22825 expat: Integer overflow in lookup in xmlparse.c
  • BZ - 2044484 - CVE-2022-22826 expat: Integer overflow in nextScaffoldPart in xmlparse.c
  • BZ - 2044488 - CVE-2022-22827 expat: Integer overflow in storeAtts in xmlparse.c
  • BZ - 2044613 - CVE-2022-23852 expat: Integer overflow in function XML_GetBuffer
  • BZ - 2048356 - CVE-2022-23990 expat: integer overflow in the doProlog function
  • BZ - 2056350 - CVE-2022-25313 expat: stack exhaustion in doctype parsing
  • BZ - 2056354 - CVE-2022-25314 expat: integer overflow in copyString()
  • BZ - 2056363 - CVE-2022-25315 expat: Integer overflow in storeRawNames()
  • BZ - 2056366 - CVE-2022-25235 expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
  • BZ - 2056370 - CVE-2022-25236 expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution

CVEs

  • CVE-2021-33193
  • CVE-2021-36160
  • CVE-2021-39275
  • CVE-2021-41524
  • CVE-2021-44224
  • CVE-2021-45960
  • CVE-2021-46143
  • CVE-2022-22822
  • CVE-2022-22823
  • CVE-2022-22824
  • CVE-2022-22825
  • CVE-2022-22826
  • CVE-2022-22827
  • CVE-2022-23852
  • CVE-2022-23990
  • CVE-2022-25235
  • CVE-2022-25236
  • CVE-2022-25313
  • CVE-2022-25314
  • CVE-2022-25315

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat JBoss Core Services 1 for RHEL 8

SRPM
jbcs-httpd24-apr-1.7.0-6.el8jbcs.src.rpm SHA-256: fea9b02a147e576ffe776171d80d4a2852379204fc6ce24d8bb681972bd084d1
jbcs-httpd24-apr-util-1.6.1-98.el8jbcs.src.rpm SHA-256: a78e04409ceb61d2f73b5ee593179d2ba2fba84baffc8f8f6933999fa9d28b0d
jbcs-httpd24-brotli-1.0.9-2.el8jbcs.src.rpm SHA-256: f196882ca73ff664f8d31b138d6a0274ba06867abd00564a222a37f3990bc830
jbcs-httpd24-curl-7.83.1-6.el8jbcs.src.rpm SHA-256: 1c6f4358fe748f0bbe23f6890607a3249071b1a0256ed20e460ab9184291bbaf
jbcs-httpd24-httpd-2.4.51-28.el8jbcs.src.rpm SHA-256: d4fa3274174df78d5be18ecd0c034a52b66fbf73f46edeaedb762bd7039316cc
jbcs-httpd24-jansson-2.14-1.el8jbcs.src.rpm SHA-256: ee03f022d2e39d570f405aa1ce8702ebd6be5198024c5202d0e2202bb73ee4d5
jbcs-httpd24-mod_http2-1.15.19-17.el8jbcs.src.rpm SHA-256: fae3032d1bf4fe15178e498c2dc0c18d4f4d95403000a049c81172cb74b86f4f
jbcs-httpd24-mod_jk-1.2.48-41.redhat_1.el8jbcs.src.rpm SHA-256: a9b917473e6a0369f41a574224fd7fa46eefe621832cf7fb4f8b898b7d6ac8af
jbcs-httpd24-mod_md-2.4.0-15.el8jbcs.src.rpm SHA-256: b7b21d23027657ac1f79bed89654111120820d4152cde71018e76942c592a83b
jbcs-httpd24-mod_proxy_cluster-1.3.17-9.el8jbcs.src.rpm SHA-256: e555e4ebe5fa4c0d0c46c28c43262a4076a2a5bd8b30cab769212b7fb711e02f
jbcs-httpd24-mod_security-2.9.3-19.el8jbcs.src.rpm SHA-256: aa250d086c9382ea3e2e021aac358ffbf8f3b82e999af250cfb4d699d1d3bf3d
jbcs-httpd24-nghttp2-1.43.0-10.el8jbcs.src.rpm SHA-256: eb3a8c29ec36d24209ee403bb7cc8d112c775a5b6e4ed0ecb956c1825e5d5e5b
jbcs-httpd24-openssl-1.1.1k-12.el8jbcs.src.rpm SHA-256: 494988d258044e7c27c820342600383890c9bdb147b7a763560c7f79e07d197f
jbcs-httpd24-openssl-chil-1.0.0-16.el8jbcs.src.rpm SHA-256: 6a1d633436d4c01a25570c75e43672ef8a08bc40a92082822d85a872ef7960f0
jbcs-httpd24-openssl-pkcs11-0.4.10-31.el8jbcs.src.rpm SHA-256: dd932cbe27dac2ded00f749887328f751ab91e1606b23297c7fc8f6358355ca8
x86_64
jbcs-httpd24-apr-1.7.0-6.el8jbcs.x86_64.rpm SHA-256: 1f937e36096e6407f3e15109f37e57dee1b699ab6ffa6f545b9396d9d492f2b0
jbcs-httpd24-apr-debuginfo-1.7.0-6.el8jbcs.x86_64.rpm SHA-256: f1d98da6385cd5a1c9f7da8dafa23e14ff404873fd82bdeaad401cbb5eaa5833
jbcs-httpd24-apr-devel-1.7.0-6.el8jbcs.x86_64.rpm SHA-256: be7e47b6be48bfe454252565ab547fb2abba718b8767aedd47eb9c961101e6a0
jbcs-httpd24-apr-util-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: c95a00d8578960e2c0edcbb7637615439e59ece40b355c191ea2d471665e0e77
jbcs-httpd24-apr-util-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 0ec126da05875de3ae8e107caadf28f4807adb53399f459d563433cbbf8ee8b1
jbcs-httpd24-apr-util-devel-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 409560d85e47eccf7ca4537c461a6bab6dbf68d36619a88b4bb8fdb3395acc24
jbcs-httpd24-apr-util-ldap-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: d006b2b9e8ed32ca553d08ca603d08f401e62affea6c2558909de3b230dcd489
jbcs-httpd24-apr-util-ldap-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 1af68db2f0444d4d0866fdecd20f4ed941bcb007bc350ff6477870ebe8124494
jbcs-httpd24-apr-util-mysql-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 9b2ac4d186f2c3c3548526ec2f748a9497645561eb611fb6ea3913b3ae5ce97f
jbcs-httpd24-apr-util-mysql-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 33b511825ab5757f6ce08ae77bd5a26b51d8b9809ee6f2c2170452b8d1033823
jbcs-httpd24-apr-util-nss-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 1f2aa2823aabc9a1554c7177c0654bef858072a922d9ae1896b9fb44eef5d527
jbcs-httpd24-apr-util-nss-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: e620e93fee9a062ad8c09e75cceb23ab42097e4e613831db26d7b0774bd8e0fb
jbcs-httpd24-apr-util-odbc-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: bc083df378a0bb4b7febaf9a2a458c646072484b918b7c2d47a4bf660fc73e1a
jbcs-httpd24-apr-util-odbc-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: ced0730fad58ed9ddf67f7a23117a7daf821d4ce98196796033c0a1c0a8d4cf3
jbcs-httpd24-apr-util-openssl-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 7005a4519ecbe822d4944a5d95bd80176dd70f507e7fe1d28d63d7fb9088a97a
jbcs-httpd24-apr-util-openssl-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: c31e1c58a93b60a983d6d02a93bbc910c268971060eaf48f8d9fbdec078a0e6d
jbcs-httpd24-apr-util-pgsql-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 51c2335e996dfe890cca3c1894fd85fe499cb0a81252e70918e5059d96e4786d
jbcs-httpd24-apr-util-pgsql-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 196bfe20cee49a32f0a4c7adabab43a968847e7aa64cc117e2a420cadf6a4a9d
jbcs-httpd24-apr-util-sqlite-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: df1afad57c9182911764a8874f148bea54dfac25fd7b5c6ff76a828ec04eaa9e
jbcs-httpd24-apr-util-sqlite-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm SHA-256: 70c4d1d9ffe3d7e66f76984a4bd54daa86e6f6ff25929c0d06cd88de7c04f79c
jbcs-httpd24-brotli-1.0.9-2.el8jbcs.x86_64.rpm SHA-256: d2c9b8a229a03633f2a63d19fd8462b9909434b38c6f92e9646d42c805cb3302
jbcs-httpd24-brotli-debuginfo-1.0.9-2.el8jbcs.x86_64.rpm SHA-256: 021bf83e45bd2f7c0229514e5bfd700f70858796bd00a1a35d5da9325d6d570a
jbcs-httpd24-brotli-devel-1.0.9-2.el8jbcs.x86_64.rpm SHA-256: ad6f8e93c31637a740f8006c81730b3c69847eebb10322ce6d3452116f944095
jbcs-httpd24-curl-7.83.1-6.el8jbcs.x86_64.rpm SHA-256: 2a17b08e1f26083ab9aa1f4f214b57d4cfed4854fc9b39c218668ce9093bbf99
jbcs-httpd24-curl-debuginfo-7.83.1-6.el8jbcs.x86_64.rpm SHA-256: 7dcbd30439847ae2a84ff793a0d809374339574fb913ade7219cc1c319020778
jbcs-httpd24-httpd-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: 68cf67f10ab5755aad0bdf2943cafbee50791644ad44afd36a092816fcf0a533
jbcs-httpd24-httpd-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: b6771871ea8f214203bfb7057ef363b2947f9430707ec40f8a001c96591d6566
jbcs-httpd24-httpd-devel-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: 47fde121e150de31f664796d465df747d00a0456e5ac66e8751231f5e4ca1811
jbcs-httpd24-httpd-manual-2.4.51-28.el8jbcs.noarch.rpm SHA-256: cc4a7cb93e7eb2b39971f862adde679241f757474500da19713527259a561053
jbcs-httpd24-httpd-selinux-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: 13c3c2585177af0323f19695918902b972609fd902238326b7f1e2bf1119fe82
jbcs-httpd24-httpd-tools-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: ebcb9add6d2b3e8c8eb995bb3e9ef6c0ded3ed35646ba5bb28600243c3c63f96
jbcs-httpd24-httpd-tools-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: 953c722640069189e6bce648cce99c437742eef52593926e4030311ad879d8f7
jbcs-httpd24-jansson-2.14-1.el8jbcs.x86_64.rpm SHA-256: 175ab639ce151d702b67c586d6e3a9b57dcf06ae0215154e2f2dfe119eb57934
jbcs-httpd24-jansson-debuginfo-2.14-1.el8jbcs.x86_64.rpm SHA-256: 237484ce75c1dae0c06dd45d70c82ea98329e67b0ae260f8aecdb5839e1fc495
jbcs-httpd24-jansson-devel-2.14-1.el8jbcs.x86_64.rpm SHA-256: 775286eabc5eaeefe08b477200bbd8e46536c362a484920217b7eed848ee7560
jbcs-httpd24-libcurl-7.83.1-6.el8jbcs.x86_64.rpm SHA-256: 5af035bdb97112d22eda9219ff2f18ea61b40c493f00ae31660b1f10e2e37e38
jbcs-httpd24-libcurl-debuginfo-7.83.1-6.el8jbcs.x86_64.rpm SHA-256: 08b44b96b877787f08dc1cfba212bfaaaf1b991b0b8e58469388692ed092acc2
jbcs-httpd24-libcurl-devel-7.83.1-6.el8jbcs.x86_64.rpm SHA-256: 264ccede550f3d79736b5cf59c8cb44c01eec7d5f5c161db07b2b9d68a43be06
jbcs-httpd24-mod_http2-1.15.19-17.el8jbcs.x86_64.rpm SHA-256: 5646b08b4b0edab27fb8df5ae8d2c5903e214f23cfcfc37726d9f126234cdb5f
jbcs-httpd24-mod_http2-debuginfo-1.15.19-17.el8jbcs.x86_64.rpm SHA-256: 4d91d396eaacaabda5127749ca46772133dd4d483174b86452d3d490269e12ee
jbcs-httpd24-mod_jk-ap24-1.2.48-41.redhat_1.el8jbcs.x86_64.rpm SHA-256: 0afefac362a0e0d2d72924d972b0ae2a205625c9270ce8ccc3a5ee2f9750877b
jbcs-httpd24-mod_jk-ap24-debuginfo-1.2.48-41.redhat_1.el8jbcs.x86_64.rpm SHA-256: 1a4f528669e8356fa3f4878caff67ce4e9c18f6ff76289ec734d1c32a2a8bab1
jbcs-httpd24-mod_ldap-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: e5f478e996a903f7371d05bbd499047ec95869caf4a821da99506731934f01a7
jbcs-httpd24-mod_ldap-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: cfbd8185985093dac7efd0fe8497632fe3dab0368ceb050cce94a661788ca597
jbcs-httpd24-mod_md-2.4.0-15.el8jbcs.x86_64.rpm SHA-256: bed7f82cdde8d463e4829491fbee2ec8cd01fe3d5f1e1a32d0404a9823a786ef
jbcs-httpd24-mod_md-debuginfo-2.4.0-15.el8jbcs.x86_64.rpm SHA-256: c2a733fa983a4c4f4f9b6f6a8495fa319ecd0bfd4239889bde44888a98ce284e
jbcs-httpd24-mod_proxy_cluster-1.3.17-9.el8jbcs.x86_64.rpm SHA-256: 4fe441ca280bc06f152b6086780012afa230ed65ff619e0f5575d6780ce93a64
jbcs-httpd24-mod_proxy_cluster-debuginfo-1.3.17-9.el8jbcs.x86_64.rpm SHA-256: 8a49af8e1eb595a0e4be42a4ad60186eb10608ecb23e615521787fc2345bff6b
jbcs-httpd24-mod_proxy_html-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: 564ebde53b5d13880895377a03d4e749341f1f2259a58d55c86448ebdb7b913a
jbcs-httpd24-mod_proxy_html-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: 9d82ad6f5961a448baacd11a2a44f903e115c0768d3305c302eac3d39e05bfce
jbcs-httpd24-mod_security-2.9.3-19.el8jbcs.x86_64.rpm SHA-256: 6201a3e8aa8f51a31f6fa4fd329793da2edbdb75d456a4547cb560797e5f7cc2
jbcs-httpd24-mod_security-debuginfo-2.9.3-19.el8jbcs.x86_64.rpm SHA-256: 4e38b0852c045f81affaf14b0398b5cf1920503898a630363eb92dead8e7bd1d
jbcs-httpd24-mod_session-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: bf9509314af825d166851681303938bc8e8d6641070f94014241e32f0e2bf9fc
jbcs-httpd24-mod_session-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: 1f6b3793e772cc75c9c2c0e52b77d6056e9d361230188e65cb372201a6486ddd
jbcs-httpd24-mod_ssl-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: 32853c116f32f0aabaeb0326d95ccda22983f0fa4b224c41d5eb2b22152d3cb2
jbcs-httpd24-mod_ssl-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm SHA-256: fde6b9027dc1ea2085fa1a393fb78218ca2d374871e923daf44eec595cf77517
jbcs-httpd24-nghttp2-1.43.0-10.el8jbcs.x86_64.rpm SHA-256: 7829f279a36bce15e25bb1a7240261f372af4d20e190f1b352e53e2cff7fd084
jbcs-httpd24-nghttp2-debuginfo-1.43.0-10.el8jbcs.x86_64.rpm SHA-256: 0eda1fff12ac3f7373af955dd50a5b2faf3c6e24570ca605302190fd84f64c40
jbcs-httpd24-nghttp2-devel-1.43.0-10.el8jbcs.x86_64.rpm SHA-256: 23f47606e23f16d8eb4a9c222fd19ec6c76dde7d975a9dfbd083cfeb9cfba140
jbcs-httpd24-openssl-1.1.1k-12.el8jbcs.x86_64.rpm SHA-256: 688a7e1d1d5c3b5b76274a538e165030cb54562e50fd4496b06c5aa36a472b2a
jbcs-httpd24-openssl-chil-1.0.0-16.el8jbcs.x86_64.rpm SHA-256: e713af872ff578620df01d69bb849d38ba4018396212e4fc37d1d1ad443c25e3
jbcs-httpd24-openssl-chil-debuginfo-1.0.0-16.el8jbcs.x86_64.rpm SHA-256: 393db99c35708682725fdb15de841f54f3ee8986cdc45daea0cc8cc559c220b3
jbcs-httpd24-openssl-debuginfo-1.1.1k-12.el8jbcs.x86_64.rpm SHA-256: dcb1ca0aa2fcc13240739c094c20b14b97be7e9fa9d6211c91cc2969ef877ec3
jbcs-httpd24-openssl-devel-1.1.1k-12.el8jbcs.x86_64.rpm SHA-256: 316fdd16b2136ef5f45ed0aa4fa3d6996b0243b72e4d0a6e2a10270bb1abd89a
jbcs-httpd24-openssl-libs-1.1.1k-12.el8jbcs.x86_64.rpm SHA-256: 4aedb92432e68cbaa816c95a8030e74c38ba7699be6ec0230a8590373c863f48
jbcs-httpd24-openssl-libs-debuginfo-1.1.1k-12.el8jbcs.x86_64.rpm SHA-256: 5dcb7dd987c8637fb64d9ace489f833f3287dcc2bf653521b61039026e1ef0ae
jbcs-httpd24-openssl-perl-1.1.1k-12.el8jbcs.x86_64.rpm SHA-256: 62f2cfdb9b73bd77562954b6043634b35c70f360b9b97167a14eb84178596112
jbcs-httpd24-openssl-pkcs11-0.4.10-31.el8jbcs.x86_64.rpm SHA-256: e8d4f45c763df3d687a4ef6feb56d534e1aa0dff4203211ca87a48d1eb310a6c
jbcs-httpd24-openssl-pkcs11-debuginfo-0.4.10-31.el8jbcs.x86_64.rpm SHA-256: 08136a3fbfb4977ec0b46c6e38de9d21622b8724ffc89dff0c4b26f16674391a
jbcs-httpd24-openssl-static-1.1.1k-12.el8jbcs.x86_64.rpm SHA-256: da522757bdbb56c9c7766162d2f21325a89dc9178e15374b3372fa77cef1b09c

Red Hat JBoss Core Services 1 for RHEL 7

SRPM
jbcs-httpd24-apr-1.7.0-6.el7jbcs.src.rpm SHA-256: 53e96484e7eb980536dcc1a073fb493451b96a4590b851435761616d9130e541
jbcs-httpd24-apr-util-1.6.1-98.el7jbcs.src.rpm SHA-256: 3761c40329cf451d224b9ae791d39b5498ca6de4fe627d0f3fc4bc628825aacb
jbcs-httpd24-brotli-1.0.9-2.el7jbcs.src.rpm SHA-256: 2b5706fdcd52a3d63a425fab1349d969906e19fe0fbf99a6c7a008d63feff717
jbcs-httpd24-curl-7.83.1-6.el7jbcs.src.rpm SHA-256: e9db9e4ab45881e7b77f380ad18088bd985db09645cf8fd000e36d80f3dc44c7
jbcs-httpd24-httpd-2.4.51-28.el7jbcs.src.rpm SHA-256: 49a21b3f74935851180779458245a938c2d4ad8b2007e79c1b65746bdde2656d
jbcs-httpd24-jansson-2.14-1.el7jbcs.src.rpm SHA-256: b128e2db0801817cf50cb0c049caee92274af8ae896037159fce7013801d785e
jbcs-httpd24-mod_http2-1.15.19-17.el7jbcs.src.rpm SHA-256: 5027b156a8737f5dfce2d1b81c1582ddae53f3de4136977b6d744d457680bf6e
jbcs-httpd24-mod_jk-1.2.48-41.redhat_1.el7jbcs.src.rpm SHA-256: c81a4bea09a2faaa6f5a386b389ad88c7d5c92ef92a8e928530ea0f9b6350873
jbcs-httpd24-mod_md-2.4.0-15.el7jbcs.src.rpm SHA-256: 0063e6dedec13762fb1fd127d6e2f5296743de58a4031efa74c9402bca412085
jbcs-httpd24-mod_proxy_cluster-1.3.17-9.el7jbcs.src.rpm SHA-256: 9923d6a5a11b7a2a8a0fc8fe437719520aeb09229f12a22896b9a3033918a779
jbcs-httpd24-mod_security-2.9.3-19.el7jbcs.src.rpm SHA-256: 1ea61735d7d7a32f60a67fe92313bbb287e105fe6bb99a8b81597dde15009d1d
jbcs-httpd24-nghttp2-1.43.0-10.el7jbcs.src.rpm SHA-256: 76582e1fb6597fca36c14d5c540ab500d4ae6092a9a99166e6aa91fbb9de1157
jbcs-httpd24-openssl-1.1.1k-12.el7jbcs.src.rpm SHA-256: 39624ed3f510d4185717a26042dfe5ab21a4a807a1fd79d55d2f6616159a088d
jbcs-httpd24-openssl-chil-1.0.0-16.el7jbcs.src.rpm SHA-256: 2ad4140fd84f5e73e443521b3ddd2d1be242b85772bba87e7ed726384d3394f3
jbcs-httpd24-openssl-pkcs11-0.4.10-31.el7jbcs.src.rpm SHA-256: 0f31581007b2a149220e81b4ae230b577fc98282d78ae76abf0d89089ae63c03
x86_64
jbcs-httpd24-apr-1.7.0-6.el7jbcs.x86_64.rpm SHA-256: 467e2fd19f946c9127ba7ac14460b0ca9ef3fa652a97b75fb8aef760ee8f1fdc
jbcs-httpd24-apr-debuginfo-1.7.0-6.el7jbcs.x86_64.rpm SHA-256: bea013273763c270ff6cb2a93742607ed2e5ea015ab36bcddea3f67fe62e5748
jbcs-httpd24-apr-devel-1.7.0-6.el7jbcs.x86_64.rpm SHA-256: 2216517efa32c5d8b1e209a488c55348b03b4649df42515126ae38f275008239
jbcs-httpd24-apr-util-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: 0b134e5101443da5ff0c0077e66a2f519cdd4eaf249a51b482f200a973fd16e2
jbcs-httpd24-apr-util-debuginfo-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: 6bdba2b2e0a6f5b57ce1d485d5f3c5b041987e0fac2e6afea18132c71c427a3b
jbcs-httpd24-apr-util-devel-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: 81ce96bf40e877c74b69cb472be7a47ecd1cb2a933c4b7a98609a2738b88d0ba
jbcs-httpd24-apr-util-ldap-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: bab2b33f9f8bbab32c33175a6cc59d0a44e93b22333a1218963f63af4a98d140
jbcs-httpd24-apr-util-mysql-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: 6df2edac03ca1bec1fc388c495239389c04634364e18e7659598f7d65c56af6b
jbcs-httpd24-apr-util-nss-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: 82abf738348153275ce641c7637f483fe285ec5ccf8de0d115d8bbbef5792404
jbcs-httpd24-apr-util-odbc-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: cf89323bf0521e3679367d99a7dab2dac415e6270a94c2df4391ba37fa447f2a
jbcs-httpd24-apr-util-openssl-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: fd29924eabcbff58ba8cc4fc38f1c2343d11b2c7fab8e46a0d385905800786dc
jbcs-httpd24-apr-util-pgsql-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: 7a36e3fa6c4c9e5fc97953f048ca9f9825381c0f492c462149d4e139a3a09d97
jbcs-httpd24-apr-util-sqlite-1.6.1-98.el7jbcs.x86_64.rpm SHA-256: 194d995de203bc2a94dc36163ad192c905fe6821acb25d79622af7eb6b94d780
jbcs-httpd24-brotli-1.0.9-2.el7jbcs.x86_64.rpm SHA-256: 7ca87f5c26343a1387f17aba1b1fabde18f0f5cf0e9d37c2fe8377917dd24ec0
jbcs-httpd24-brotli-debuginfo-1.0.9-2.el7jbcs.x86_64.rpm SHA-256: f90d99bed94ed9e91e129bce557e9ab42ab93d103c544c832b5ca0d54a4450ea
jbcs-httpd24-brotli-devel-1.0.9-2.el7jbcs.x86_64.rpm SHA-256: 644cfc90bfde4fa917edd436ba277ec58e4af4b305280dd85cb82b149c6db686
jbcs-httpd24-curl-7.83.1-6.el7jbcs.x86_64.rpm SHA-256: 2dc077a1a39e3995768b681272efb2abe61bb777fb8ffdaf53b2910d0a5ef8e3
jbcs-httpd24-curl-debuginfo-7.83.1-6.el7jbcs.x86_64.rpm SHA-256: 2499a17ca1e1924dd14c9712669aaec4e47ca267bd0b1d84da1dbd695b107e9d
jbcs-httpd24-httpd-2.4.51-28.el7jbcs.x86_64.rpm SHA-256: 822d54ea182b968aa7d0af32311c33623d354c321a4bd922cee9a3d8f5450a3b
jbcs-httpd24-httpd-debuginfo-2.4.51-28.el7jbcs.x86_64.rpm SHA-256: 4a68bc0fb33b8b89b7104a28ef7fb4305ad1440bb9a20a924631c1ca70f2161d
jbcs-httpd24-httpd-devel-2.4.51-28.el7jbcs.x86_64.rpm SHA-256: ed291efa7968af022a8c1a9d00297f1b50c5138ae4d9c90a22c0f78f603d849f
jbcs-httpd24-httpd-manual-2.4.51-28.el7jbcs.noarch.rpm SHA-256: 566c80204a2a312f85f6c4919f4f8ff0ebf88962547b732796ff7f49396d1c59
jbcs-httpd24-httpd-selinux-2.4.51-28.el7jbcs.x86_64.rpm SHA-256: 41b0616ffc44837ea7df8b60d9b123d69e1fcf38c3f1056565dd4ca803c95511
jbcs-httpd24-httpd-tools-2.4.51-28.el7jbcs.x86_64.rpm SHA-256: 3c8ba8dfae4a5392fabf70a2b30a24853ba65824a15e4867607fb327df845dd0
jbcs-httpd24-jansson-2.14-1.el7jbcs.x86_64.rpm SHA-256: 52b35dc8814b99510fb7b436a802b1a75d017c7a3071ef3871ca5764d551a4f4
jbcs-httpd24-jansson-debuginfo-2.14-1.el7jbcs.x86_64.rpm SHA-256: cb8ae477fba3977832eb5879e64298c83bfcd80dfa4b0c7d68c23b64346b4dea
jbcs-httpd24-jansson-devel-2.14-1.el7jbcs.x86_64.rpm SHA-256: 935ce7ffd3115438ba4d312a7b0f0e2dcdef15453395266d2284308a691ebe97
jbcs-httpd24-libcurl-7.83.1-6.el7jbcs.x86_64.rpm SHA-256: 335863c9cbaa8101fd5a00625dd5772efc2b8f7eff010150b5238b1a77a624b2
jbcs-httpd24-libcurl-devel-7.83.1-6.el7jbcs.x86_64.rpm SHA-256: 9b6ccce678a5a69bf93714052b389c2181676eeaeaa3a5cd2dbb46c6cfd9dba3
jbcs-httpd24-mod_http2-1.15.19-17.el7jbcs.x86_64.rpm SHA-256: d93fee51e41632d68a07f52241c433e81455e017f59efd966be2d4ebfa14da4c
jbcs-httpd24-mod_http2-debuginfo-1.15.19-17.el7jbcs.x86_64.rpm SHA-256: 984d6a2306ff8cc296def631f53b2823f6aa6f91585c58f35cc44d412f1479ba
jbcs-httpd24-mod_jk-ap24-1.2.48-41.redhat_1.el7jbcs.x86_64.rpm SHA-256: 816c828d499b30102dde850129e7d6dbc5003846cc372777fed1d5265437154c
jbcs-httpd24-mod_jk-debuginfo-1.2.48-41.redhat_1.el7jbcs.x86_64.rpm SHA-256: 41e841bfd047245e701a38a5b0cf7f576681a5e79c490a5aa0914b96645e97cd
jbcs-httpd24-mod_ldap-2.4.51-28.el7jbcs.x86_64.rpm SHA-256: 04ba29d5174d20c88eec0566872d917094dd7c5df2d18a0e7318d09d8a61cfb9
jbcs-httpd24-mod_md-2.4.0-15.el7jbcs.x86_64.rpm SHA-256: 41242abd91dbff61ca6b60631505f9c4279a797c18efee9c1e55d4924bfa2726
jbcs-httpd24-mod_md-debuginfo-2.4.0-15.el7jbcs.x86_64.rpm SHA-256: c112ba4082c5b05d14eddd314f31f2540b01e3a72eddb748dc24fd92a8b6ac68
jbcs-httpd24-mod_proxy_cluster-1.3.17-9.el7jbcs.x86_64.rpm SHA-256: 996536e627da69a77909f77c5acf54ca40b504299a2f98f0674d87c1b83a396c
jbcs-httpd24-mod_proxy_cluster-debuginfo-1.3.17-9.el7jbcs.x86_64.rpm SHA-256: f59773a5fb907ca6cbc6141a66370a21fa4d964e83a68e2e0e083cf236fda4d0
jbcs-httpd24-mod_proxy_html-2.4.51-28.el7jbcs.x86_64.rpm SHA-256: eaf2e31ecd1fd7f1d70ce804d1af634f149619c5d1858f9cd65084830b8984ee
jbcs-httpd24-mod_security-2.9.3-19.el7jbcs.x86_64.rpm SHA-256: cf902737eb3f8cb2d50f67d587e1c5a87a1a2a8dcc113d147c5988f0c4cf40e5
jbcs-httpd24-mod_security-debuginfo-2.9.3-19.el7jbcs.x86_64.rpm SHA-256: ff0366bd6b8e88a3f6c38ca84236af39e5c1bfa5fd1a71126add5e61e5637815
jbcs-httpd24-mod_session-2.4.51-28.el7jbcs.x86_64.rpm SHA-256: 995b277e801df22ce7c4762be1bff9f86b425e72ff548dd8a9cd39c21b867c87
jbcs-httpd24-mod_ssl-2.4.51-28.el7jbcs.x86_64.rpm SHA-256: ef572be81788c1903a11dd56638ae7ddf3cea99be5c31180f4b5884312ce6081
jbcs-httpd24-nghttp2-1.43.0-10.el7jbcs.x86_64.rpm SHA-256: ce57800b2db624feb47ab2c6f55af6aeaf1801c383bf2c8a49655ce921f484d0
jbcs-httpd24-nghttp2-debuginfo-1.43.0-10.el7jbcs.x86_64.rpm SHA-256: 361bbc0a3554d126feec560f625aff0624f568170bd9177783febfdd4aed677e
jbcs-httpd24-nghttp2-devel-1.43.0-10.el7jbcs.x86_64.rpm SHA-256: 47a452258071d6a7c53ffd1923ef2c1f4ef931671b6fab2cbb053982ff68bcc7
jbcs-httpd24-openssl-1.1.1k-12.el7jbcs.x86_64.rpm SHA-256: 09700d4287c730d1301b84d13b3f649f781ec0996f54438f2a630aaf48bc93b5
jbcs-httpd24-openssl-chil-1.0.0-16.el7jbcs.x86_64.rpm SHA-256: 4f29a2c6322ef99ae9b8eb26d534aa8ff71aaa49bde70357f7f280d78dc5b52a
jbcs-httpd24-openssl-chil-debuginfo-1.0.0-16.el7jbcs.x86_64.rpm SHA-256: 13447852f6b2f2240a9ac64a627ffd77a70c68f0d6a767fb65b72ac494a84def
jbcs-httpd24-openssl-debuginfo-1.1.1k-12.el7jbcs.x86_64.rpm SHA-256: d1fe7823fda847897ec7e8f68b70085c1385a044bc2c1466b4b9929f11cc41e0
jbcs-httpd24-openssl-devel-1.1.1k-12.el7jbcs.x86_64.rpm SHA-256: 405e88b21dd0c2e2d1295fb88afa01d9e233963a6a1ae61e232fce188d55b687
jbcs-httpd24-openssl-libs-1.1.1k-12.el7jbcs.x86_64.rpm SHA-256: cd81a8478f8aa7938611fe252582bc78c68ddae6a28e9c0669c061c7c64023a6
jbcs-httpd24-openssl-perl-1.1.1k-12.el7jbcs.x86_64.rpm SHA-256: d23ecb74d2bba5867ca029668e0b830adc32f0a54aa7c49159085ab03d6affd6
jbcs-httpd24-openssl-pkcs11-0.4.10-31.el7jbcs.x86_64.rpm SHA-256: 489d85a405275597adb954b7cafae22d88bba2abe8a72260c9a33ca02969d8de
jbcs-httpd24-openssl-pkcs11-debuginfo-0.4.10-31.el7jbcs.x86_64.rpm SHA-256: b9176ccdaa5081a6fbe313574af8278832acca50da121bf772ff8331a7496875
jbcs-httpd24-openssl-static-1.1.1k-12.el7jbcs.x86_64.rpm SHA-256: 3145058942ae9db5eb4d9c21efcd73bd92d8c1189195dc1a18eb4cdf0732f0b6

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter