Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:2994 - Security Advisory
Issued:
2026-02-23
Updated:
2026-02-23

RHSA-2026:2994 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 SP3 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 3 is now available.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.

This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 3 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 2, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.

Security Fix(es):

  • openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap [jbcs-httpd-2.4] (CVE-2025-9230)
  • jbcs-httpd24-httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... [jbcs-httpd-2.4] (CVE-2025-58098)
  • jbcs-httpd24-httpd: Apache HTTP Server: mod_md (ACME), unintended retry intervals [jbcs-httpd-2.4] (CVE-2025-55753)
  • jbcs-httpd24-httpd: Apache HTTP Server: CGI environment variable override [jbcs-httpd-2.4] (CVE-2025-65082)
  • jbcs-httpd24-httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo [jbcs-httpd-2.4] (CVE-2025-66200)
  • openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 (CVE-2025-69419)

A Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat JBoss Core Services 1 for RHEL 8 x86_64
  • Red Hat JBoss Core Services 1 for RHEL 7 x86_64

Fixes

  • BZ - 2396054 - CVE-2025-9230 openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
  • BZ - 2419139 - CVE-2025-65082 httpd: Apache HTTP Server: CGI environment variable override
  • BZ - 2419140 - CVE-2025-55753 mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals
  • BZ - 2419262 - CVE-2025-66200 httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo
  • BZ - 2419365 - CVE-2025-58098 httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...
  • BZ - 2430386 - CVE-2025-69419 openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing

CVEs

  • CVE-2025-9230
  • CVE-2025-55753
  • CVE-2025-58098
  • CVE-2025-65082
  • CVE-2025-66200
  • CVE-2025-69419

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_service_pack_3_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat JBoss Core Services 1 for RHEL 8

SRPM
jbcs-httpd24-apr-util-1.6.3-4.el8jbcs.src.rpm SHA-256: 8264c415614ad8e841124ce5c263b0f9948bef329de00d891e568b79ba4ed0d3
jbcs-httpd24-httpd-2.4.62-11.el8jbcs.src.rpm SHA-256: 2fb72e9da4d2f2ccdabd3b9f993df2d622df0325002a7b693f76e0bd8e05f31c
jbcs-httpd24-mod_http2-2.0.29-8.el8jbcs.src.rpm SHA-256: 7814667656e7c0714b361c90df1949b74bc1b12fbe6c66f9703be79f190dadc3
jbcs-httpd24-mod_jk-1.2.50-12.redhat_1.el8jbcs.src.rpm SHA-256: b00673a3b85afdd0e4ccb9138e322335bc052415b1a5b9948ff18bebc2839c9a
jbcs-httpd24-mod_md-2.4.28-13.el8jbcs.src.rpm SHA-256: 566c94ab7b50a17c4ef371a1fa3caaca392fb3b427315fd228282be8074904a8
jbcs-httpd24-mod_proxy_cluster-1.3.22-7.el8jbcs.src.rpm SHA-256: 4da775a3a519a13b96ecc9c89fb8b98f4c53dc93b6dd573370a3f9c60a864ea4
jbcs-httpd24-mod_security-2.9.6-14.el8jbcs.src.rpm SHA-256: 49154a321fa001ed7638f98307033f47207abc270ad8ed8f5bafb0a20f525302
x86_64
jbcs-httpd24-apr-util-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: 9ac67d18b0eca9e06a771dd262f6f70060297f97482261b2678277208222176d
jbcs-httpd24-apr-util-debuginfo-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: 9f5d8ff7efa36329133aab71dc8dc2d5221c484c757a5dd7bc50dbcb66ec39f5
jbcs-httpd24-apr-util-devel-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: a8b3058ca21bc22801a5dc3a589d04c5cc56c3a3f9daeb4c0e39f7091d65b564
jbcs-httpd24-apr-util-ldap-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: 2efe8fee452ce8985f76036612593d8916dc94808b5fbef396476301cb15d5b8
jbcs-httpd24-apr-util-ldap-debuginfo-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: e8cdc9407ee4054a617540dc78cebfbff2e049b118996704cb43941186679943
jbcs-httpd24-apr-util-mysql-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: 90c72ea56aa5f9a98f4e2333534bffbf0eb8c7899eb26bf7da39ad798c4a0e7b
jbcs-httpd24-apr-util-mysql-debuginfo-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: 181e7d3a37994db8c982872fd582bcf4bf68b0d3865a200d45513486d76993ca
jbcs-httpd24-apr-util-nss-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: cb4d36ad2d278a89d5f60d8f110f1ed24ea457528a0b5f13e5238abc75e16f9a
jbcs-httpd24-apr-util-nss-debuginfo-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: 9f21d55b7edcecc8c3bfd9eb8a5c7429d742c768561f8876c31a21907fde1d11
jbcs-httpd24-apr-util-odbc-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: 9af8b9b41ce40ecd1bdbde73d38193601a00d55377c75e126cf4c70dda91bedc
jbcs-httpd24-apr-util-odbc-debuginfo-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: fb39513952d3f25af46e5f669a8e81a34df353f93887da7606c5d333a356e1ac
jbcs-httpd24-apr-util-openssl-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: c115576d311ccb61a3f433da4fa5f63fefac7669113ca98ba00fd622a022f1b2
jbcs-httpd24-apr-util-openssl-debuginfo-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: 214b04fb8d6ebf41c48f78b8a70672b25678e75e13eae739467165cf2fc27447
jbcs-httpd24-apr-util-pgsql-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: d753f68ee1c8c92cbfc823fc4dc5ff7cc74b370386ce796979fae9f01b0fcca2
jbcs-httpd24-apr-util-pgsql-debuginfo-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: 75a1dfb68c4a97532de74da80e2199cf2a7c1bd706f17fdeb0d43df6d270dd22
jbcs-httpd24-apr-util-sqlite-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: dafba9d5dd130177fedaa2756f8bef9a4a74332f699efe7871cdf800210966af
jbcs-httpd24-apr-util-sqlite-debuginfo-1.6.3-4.el8jbcs.x86_64.rpm SHA-256: afcb2f7b868970d8f24b2bc2cb92a409606cc9e65cafcd6dd8ed662c79df9f76
jbcs-httpd24-httpd-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: 7839412d025ea49b67a4c95348e82891de126a0b8f8eec2830662cfad24a3f20
jbcs-httpd24-httpd-debuginfo-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: a0ed08dc415b3bbd5364cd8e89c23059d78ceb36273dbbe1bf3b28b4d125d8af
jbcs-httpd24-httpd-devel-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: daf3a7d614dc54916c23c5cf9cab03d2a6f4d5e328a7c6059895fea431679c04
jbcs-httpd24-httpd-manual-2.4.62-11.el8jbcs.noarch.rpm SHA-256: c9a3b52079b22a2400e095363e955d601c164bc44e0477f1b77ca9624d0f9dd2
jbcs-httpd24-httpd-selinux-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: 5a3bf81fcb59fa81f692951cd98da4bf6724c632e99f2802c878c56474591b1c
jbcs-httpd24-httpd-tools-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: 3ac935f04b935fbd7f3febc27890b423f30ecb38cece281fbba2ff2a63a81519
jbcs-httpd24-httpd-tools-debuginfo-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: b549b0f2158af41775ce99a7c69c832567cc5cdb26cf14e6ed2515dc8074b745
jbcs-httpd24-mod_http2-2.0.29-8.el8jbcs.x86_64.rpm SHA-256: 8054d31b8eda67541f8c18cf0ef986e0639a710fc273e177be78e97f5c4a87c0
jbcs-httpd24-mod_http2-debuginfo-2.0.29-8.el8jbcs.x86_64.rpm SHA-256: b5549f079a9205d540bb0795b953a988fa4c22d1002a4548afc7766baaa1042d
jbcs-httpd24-mod_jk-ap24-1.2.50-12.redhat_1.el8jbcs.x86_64.rpm SHA-256: 67d5a44c32eb2b0e7328fdbc1a8b2b5d26dbcd98915c8c238d28c8db9b029031
jbcs-httpd24-mod_jk-ap24-debuginfo-1.2.50-12.redhat_1.el8jbcs.x86_64.rpm SHA-256: cec321366d16a29d3e8e64df80704d35fab92bb7a8c95a5cad4edd0fa071c5d6
jbcs-httpd24-mod_ldap-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: 1be9903921618bc4d704493b13a47ce1441f9d5f17fcb5a1224c136294c9d96a
jbcs-httpd24-mod_ldap-debuginfo-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: 8aa4404098bccacdfa9339a95e1cf0ed54d7ebb5bca253a6c3417b0907d1915a
jbcs-httpd24-mod_md-2.4.28-13.el8jbcs.x86_64.rpm SHA-256: 47fc9b5ff857ffbf959b2b5a183d1acb629659e1da5d3b252227eba9309718d0
jbcs-httpd24-mod_md-debuginfo-2.4.28-13.el8jbcs.x86_64.rpm SHA-256: 8ddecf8a236541135793afbf9d379020cd35f71c23ad5609dcd5e579154c4a9e
jbcs-httpd24-mod_proxy_cluster-1.3.22-7.el8jbcs.x86_64.rpm SHA-256: 6fc9f527427ee7a09ac1547296fe97eb2840d8a6b1904f0ae9a7baff8642bb00
jbcs-httpd24-mod_proxy_cluster-debuginfo-1.3.22-7.el8jbcs.x86_64.rpm SHA-256: dee6f67fe861f09d2b1c0682955f3305042c63575d4830c6105b1fbfae794f96
jbcs-httpd24-mod_proxy_html-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: 4cec51fd005b5fe3ecbe26a4ee8b24c93e209b15698e5152470cf93183fd2fa7
jbcs-httpd24-mod_proxy_html-debuginfo-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: dcf126d0e8ed6f279402233b73e07b49c52833a0d0a6e75d4c24f9a67d8857b3
jbcs-httpd24-mod_security-2.9.6-14.el8jbcs.x86_64.rpm SHA-256: defdebce4fda64f1735d31bd6e87eff2f794d452b2fb889dd769b80068c9c12d
jbcs-httpd24-mod_security-debuginfo-2.9.6-14.el8jbcs.x86_64.rpm SHA-256: 4d5c5809cd0142af81de4ae34d924d6756b23000207fa9dfa348b49c7561ccbf
jbcs-httpd24-mod_session-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: 4132599635253335a1fe65a87113dba9f241e9ff2204f0f5024aa268631347ee
jbcs-httpd24-mod_session-debuginfo-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: d23fbd1c08caec7139e60e36ee0475e583f6f3f6c6a5be5f466bacfb43faa8c5
jbcs-httpd24-mod_ssl-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: 86bd67dc65dd4ce218ba394294a1a137eaf8afd69c7e47236a89e94bae6d2bb7
jbcs-httpd24-mod_ssl-debuginfo-2.4.62-11.el8jbcs.x86_64.rpm SHA-256: 353a65216c235962c67906c1e1f6b2158afdd5aa97b76d9ad30a8bc8189b079c

Red Hat JBoss Core Services 1 for RHEL 7

SRPM
jbcs-httpd24-apr-util-1.6.3-4.el7jbcs.src.rpm SHA-256: e01043d6242e2ac2d730ee4069325abe6aae5a8b34e0bb915645560b980f66d6
jbcs-httpd24-curl-8.11.0-4.el7jbcs.src.rpm SHA-256: fd2295a1bf96072392230fb9f3f2a160bab707b3b2df051421fd09c981995212
jbcs-httpd24-httpd-2.4.62-11.el7jbcs.src.rpm SHA-256: 0e62ec614f77fc4a2fb3d0e4c052b55309bf886207c1e31be572be6248587d09
jbcs-httpd24-mod_http2-2.0.29-8.el7jbcs.src.rpm SHA-256: 04cfccdebaa577644f2ca1919fc532d83734abdca8b85d08c1a478725ef0d10d
jbcs-httpd24-mod_jk-1.2.50-12.redhat_1.el7jbcs.src.rpm SHA-256: 62b8e8f2fc83c8140cfe7f7febc8f34c87278c506e768eb2cb4c72ee729c5f0e
jbcs-httpd24-mod_md-2.4.28-13.el7jbcs.src.rpm SHA-256: 75fda6cd353ca61276b1d16ae6859d63bf3f420bebec234cb5319e88f2e0dbc1
jbcs-httpd24-mod_proxy_cluster-1.3.22-7.el7jbcs.src.rpm SHA-256: 8614ebe9cc2ab3d1debc6353a45dd61c842a04ac1fb5a3ea0a71063328ea8d66
jbcs-httpd24-mod_security-2.9.6-14.el7jbcs.src.rpm SHA-256: 09fd79100a34db9e49d9fe63cea8b92b611820b862f4b54d2c72cb5049f93fc5
jbcs-httpd24-openssl-1.1.1k-21.el7jbcs.src.rpm SHA-256: c263e1bdc1fbf0b7f3c906767ed611870bf7c5dd1359b13b57d971a91ebb1a50
jbcs-httpd24-openssl-chil-1.0.0-25.el7jbcs.src.rpm SHA-256: 435fcd8288b166869de9f692b65db8901a92f0eb1ff1ed899919428c06351077
jbcs-httpd24-openssl-pkcs11-0.4.12-5.el7jbcs.src.rpm SHA-256: 9d0ad910c299a5402a73c661f845c213d161b2deaa9d5778bf63fb468d7a3621
x86_64
jbcs-httpd24-apr-util-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: 42208c64463c11937675c897a8febcfee3191f72cdf2311513173b99982deeb2
jbcs-httpd24-apr-util-debuginfo-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: 4596e79d03069045c4ab05d63deaa0b4c9576fb3b1a375c6b4e4aa0325b50b2a
jbcs-httpd24-apr-util-devel-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: c25642f9bb2046f1014e53560ce331dbab2687cc981d68dd1213b6171f5cfca1
jbcs-httpd24-apr-util-ldap-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: 622e3fcdf59a903a0bd8a68ba0d5730a7d79fc0013f7ebd3759d45e1421a6caf
jbcs-httpd24-apr-util-mysql-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: b657eb3d75c0d51aee4d5a3a74dd7f138a464012e91d8d8f143e8611cce4448b
jbcs-httpd24-apr-util-nss-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: eaaf47a55fb72bd2894372247cd649abc2efa290d1a01c6598cb41d9625d8f52
jbcs-httpd24-apr-util-odbc-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: 36f88806b16d5a983eb4cc92ed7c73a36fda7cc384ca5c4548fca5cd001eecae
jbcs-httpd24-apr-util-openssl-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: 9eb7d5abe3da4d9c185610de8aa67fd7255270e490ccfddff58e56e8ee1500d3
jbcs-httpd24-apr-util-pgsql-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: 48557ecc4795d56fb5639fdcbfd904321068151acc0ddf4b815922658df8338e
jbcs-httpd24-apr-util-sqlite-1.6.3-4.el7jbcs.x86_64.rpm SHA-256: ca130b189b0cf02ca7cc233f5d356fbacab70433064c9f2becb61ffc9deec315
jbcs-httpd24-curl-8.11.0-4.el7jbcs.x86_64.rpm SHA-256: c969994b2d002e8c94580d0a03cc9a2617aecca47db20c6ccb0779cc11a87d78
jbcs-httpd24-curl-debuginfo-8.11.0-4.el7jbcs.x86_64.rpm SHA-256: 53e5a8d08f3dfc007a2e92d8e327ae4db45d6982594aa8442750dabfc83bf2fa
jbcs-httpd24-httpd-2.4.62-11.el7jbcs.x86_64.rpm SHA-256: c271a7cb4bfa9ecf3bbe6e084d1bde85da4f01c875e21605f4baa28cf32c7da1
jbcs-httpd24-httpd-debuginfo-2.4.62-11.el7jbcs.x86_64.rpm SHA-256: e64ef1a95d66b4030f409693fac7dacea318c060b6a718e331ecfd8a04d886f8
jbcs-httpd24-httpd-devel-2.4.62-11.el7jbcs.x86_64.rpm SHA-256: 055d680881656dd4df2a4982da905cab26846bb8dedf14488f5eb2832e560f12
jbcs-httpd24-httpd-manual-2.4.62-11.el7jbcs.noarch.rpm SHA-256: a2c4fc616ba49f429ebcef7c648e0753b7f280f728da746715d7bfdcdfbde212
jbcs-httpd24-httpd-selinux-2.4.62-11.el7jbcs.x86_64.rpm SHA-256: c1c55134527f38567f0c6fb2614aaa7cd4be10af86f30eea458d9404d2e13f28
jbcs-httpd24-httpd-tools-2.4.62-11.el7jbcs.x86_64.rpm SHA-256: a0bd71d29ce54a0976ac1f038c8a89ae4f07705e15273f5c9e5156bd5f6918f2
jbcs-httpd24-libcurl-8.11.0-4.el7jbcs.x86_64.rpm SHA-256: da097d8fd7b983c6284a4b3d625977bed6e69735220d50903a3ec0cf5dd8659a
jbcs-httpd24-libcurl-devel-8.11.0-4.el7jbcs.x86_64.rpm SHA-256: d14357276cabc00388531f01684f9ac389f1fdd23c4c945bac021cb5dae8bd66
jbcs-httpd24-mod_http2-2.0.29-8.el7jbcs.x86_64.rpm SHA-256: dff4236b5e3ba6f8b53aa0a6219ea2d98fea4055e961e8188e15247ac9b2c147
jbcs-httpd24-mod_http2-debuginfo-2.0.29-8.el7jbcs.x86_64.rpm SHA-256: 53d9da360fe142b8a329c7a3ba7ab478ea1817e7e601c4775cae5c64892e39c5
jbcs-httpd24-mod_jk-ap24-1.2.50-12.redhat_1.el7jbcs.x86_64.rpm SHA-256: 2a90f0289aaccb579c8226a8735fa6bbf708ca07ba25c1d4a7749f5bd9edfedd
jbcs-httpd24-mod_jk-debuginfo-1.2.50-12.redhat_1.el7jbcs.x86_64.rpm SHA-256: 146b3e34cd28edb3fc2170ebe1ad4b755ee380470782bd96e311b22cd4a3c147
jbcs-httpd24-mod_ldap-2.4.62-11.el7jbcs.x86_64.rpm SHA-256: 1d50776ff8cd4dea7feab3f448cece37d2473d0fd454f84aa32538f0003c8b2f
jbcs-httpd24-mod_md-2.4.28-13.el7jbcs.x86_64.rpm SHA-256: 42cd7bbbc8b7d42860492eebf395a29919e23c883f2841257a9cbb14ee2c8e29
jbcs-httpd24-mod_md-debuginfo-2.4.28-13.el7jbcs.x86_64.rpm SHA-256: 0a9e88a1cd2b9a7e7027467df73bc78bbf1903d70b5585b106ed01d3f34e0547
jbcs-httpd24-mod_proxy_cluster-1.3.22-7.el7jbcs.x86_64.rpm SHA-256: c74449bcfdb099362aa5005c3a1601c39c17f34879b90dd4b01dfd934e03551c
jbcs-httpd24-mod_proxy_cluster-debuginfo-1.3.22-7.el7jbcs.x86_64.rpm SHA-256: eeda05a68f288f2a488e42322fe7ad3a2d0185c936482fdc84a5d116090636b6
jbcs-httpd24-mod_proxy_html-2.4.62-11.el7jbcs.x86_64.rpm SHA-256: 57709cb8e2a85391dccad7fbaa737d1f937ba593b1295fb7521d9b2c82574db7
jbcs-httpd24-mod_security-2.9.6-14.el7jbcs.x86_64.rpm SHA-256: f32d85787c72929efcb93e00c44c9893bcfc2a7d6e7a2f70762b5c09b8479499
jbcs-httpd24-mod_security-debuginfo-2.9.6-14.el7jbcs.x86_64.rpm SHA-256: 4ca89d50890529ad4a3bb4d491ca29e20a5ce7c15b89afff4c47824cfc931f1e
jbcs-httpd24-mod_session-2.4.62-11.el7jbcs.x86_64.rpm SHA-256: 9e741a7dc87be30cf8aa0c8d7eeb27fba4628fc55f5659d265f98fb5672d564c
jbcs-httpd24-mod_ssl-2.4.62-11.el7jbcs.x86_64.rpm SHA-256: cb563137ab81b27d164168ca1f9ed08f17df796c0aac1e503e8b1e9bb670e805
jbcs-httpd24-openssl-1.1.1k-21.el7jbcs.x86_64.rpm SHA-256: 697cd65f4196552850ffb29850dc7fc25f8cf773cc1afa6e8b7f82cbe6adc97a
jbcs-httpd24-openssl-chil-1.0.0-25.el7jbcs.x86_64.rpm SHA-256: 6d15aab7c0b75b47f873e8696f7eff9fc7ff42bfb023f34641c2d1d9dbc62610
jbcs-httpd24-openssl-chil-debuginfo-1.0.0-25.el7jbcs.x86_64.rpm SHA-256: 8039ee81279344e3139a773b50cb55fd7285152e34ac704f99d17bc1367f88d4
jbcs-httpd24-openssl-debuginfo-1.1.1k-21.el7jbcs.x86_64.rpm SHA-256: 7bb0d2b3a9845c7e1129428485db6403ec4d6bb636849f1c27f49c722968e218
jbcs-httpd24-openssl-devel-1.1.1k-21.el7jbcs.x86_64.rpm SHA-256: 539073076063f7d2aba024c9eae65661d635ef80ac6482e05b907ba475d40939
jbcs-httpd24-openssl-libs-1.1.1k-21.el7jbcs.x86_64.rpm SHA-256: efaf445f9d43a65c0a99afaf4f0fa1c5035834d3aa5b66a8eff2ffa55d222eae
jbcs-httpd24-openssl-perl-1.1.1k-21.el7jbcs.x86_64.rpm SHA-256: cc295460a05ab07c3b90ddbb06eed2939953946978448b2e9d2462640a75267a
jbcs-httpd24-openssl-pkcs11-0.4.12-5.el7jbcs.x86_64.rpm SHA-256: 97abb03dca59247c2b872c2ad56d497c3323d69da39a40ace25214ac45110498
jbcs-httpd24-openssl-pkcs11-debuginfo-0.4.12-5.el7jbcs.x86_64.rpm SHA-256: da8db259176bcb933289212c513c9ad7c6e2787ccddd6e093eccc3b54600e7ca
jbcs-httpd24-openssl-static-1.1.1k-21.el7jbcs.x86_64.rpm SHA-256: dd2d53b5ccd3a9437fd5a476f1bc336be3f24548278cb3bc75f818ed2661046d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility