CWE
190 416
Advisory Published
Advisory Published

RHSA-2023:4629: Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 security update

First published: Tue Aug 15 2023(Updated: )

Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 security update

Affected SoftwareAffected VersionHow to fix
redhat/jbcs-httpd24-apr<1.7.0-8.el8
1.7.0-8.el8
redhat/jbcs-httpd24-apr-util<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-curl<8.2.1-1.el8
8.2.1-1.el8
redhat/jbcs-httpd24-httpd<2.4.57-5.el8
2.4.57-5.el8
redhat/jbcs-httpd24-apr-debuginfo<1.7.0-8.el8
1.7.0-8.el8
redhat/jbcs-httpd24-apr-devel<1.7.0-8.el8
1.7.0-8.el8
redhat/jbcs-httpd24-apr-util-debuginfo<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-devel<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-ldap<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-ldap-debuginfo<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-mysql<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-mysql-debuginfo<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-nss<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-nss-debuginfo<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-odbc<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-odbc-debuginfo<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-openssl<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-openssl-debuginfo<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-pgsql<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-pgsql-debuginfo<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-sqlite<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-apr-util-sqlite-debuginfo<1.6.1-102.el8
1.6.1-102.el8
redhat/jbcs-httpd24-curl-debuginfo<8.2.1-1.el8
8.2.1-1.el8
redhat/jbcs-httpd24-httpd-debuginfo<2.4.57-5.el8
2.4.57-5.el8
redhat/jbcs-httpd24-httpd-devel<2.4.57-5.el8
2.4.57-5.el8
redhat/jbcs-httpd24-httpd-manual<2.4.57-5.el8
2.4.57-5.el8
redhat/jbcs-httpd24-httpd-selinux<2.4.57-5.el8
2.4.57-5.el8
redhat/jbcs-httpd24-httpd-tools<2.4.57-5.el8
2.4.57-5.el8
redhat/jbcs-httpd24-httpd-tools-debuginfo<2.4.57-5.el8
2.4.57-5.el8
redhat/jbcs-httpd24-libcurl<8.2.1-1.el8
8.2.1-1.el8
redhat/jbcs-httpd24-libcurl-debuginfo<8.2.1-1.el8
8.2.1-1.el8
redhat/jbcs-httpd24-libcurl-devel<8.2.1-1.el8
8.2.1-1.el8
redhat/jbcs-httpd24-apr<1.7.0-8.el7
1.7.0-8.el7
redhat/jbcs-httpd24-apr-util<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-curl<8.2.1-1.el7
8.2.1-1.el7
redhat/jbcs-httpd24-httpd<2.4.57-5.el7
2.4.57-5.el7
redhat/jbcs-httpd24-apr-debuginfo<1.7.0-8.el7
1.7.0-8.el7
redhat/jbcs-httpd24-apr-devel<1.7.0-8.el7
1.7.0-8.el7
redhat/jbcs-httpd24-apr-util-debuginfo<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-apr-util-devel<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-apr-util-ldap<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-apr-util-mysql<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-apr-util-nss<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-apr-util-odbc<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-apr-util-openssl<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-apr-util-pgsql<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-apr-util-sqlite<1.6.1-102.el7
1.6.1-102.el7
redhat/jbcs-httpd24-curl-debuginfo<8.2.1-1.el7
8.2.1-1.el7
redhat/jbcs-httpd24-httpd-debuginfo<2.4.57-5.el7
2.4.57-5.el7
redhat/jbcs-httpd24-httpd-devel<2.4.57-5.el7
2.4.57-5.el7
redhat/jbcs-httpd24-httpd-manual<2.4.57-5.el7
2.4.57-5.el7
redhat/jbcs-httpd24-httpd-selinux<2.4.57-5.el7
2.4.57-5.el7
redhat/jbcs-httpd24-httpd-tools<2.4.57-5.el7
2.4.57-5.el7
redhat/jbcs-httpd24-libcurl<8.2.1-1.el7
8.2.1-1.el7
redhat/jbcs-httpd24-libcurl-devel<8.2.1-1.el7
8.2.1-1.el7
Red Hat JBoss Core Services

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of RHSA-2023:4629?

    The severity of RHSA-2023:4629 is classified as moderate.

  • How do I fix RHSA-2023:4629?

    To fix RHSA-2023:4629, you should update to the specified remedial package versions according to the advisory.

  • What products are affected by RHSA-2023:4629?

    RHSA-2023:4629 affects several packages within Red Hat JBoss Core Services, including Apache HTTP Server versions 2.4.57 and various JBoss packages.

  • Is there a workaround for RHSA-2023:4629?

    There are no specific workarounds recommended for RHSA-2023:4629, so applying the update is the suggested action.

  • When was RHSA-2023:4629 released?

    RHSA-2023:4629 was released as a security update to address vulnerabilities in Red Hat JBoss Core Services.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203