$ sudo dnf info httpd
Last metadata expiration check: 0:26:25 ago on Wed Jul 30 10:26:49 2025.
Installed Packages
Name : httpd
Version : 2.4.62
Release : 4.el9
Architecture : x86_64
Size : 59 k
Source : httpd-2.4.62-4.el9.src.rpm
Repository : @System
From repo : appstream
Summary : Apache HTTP Server
URL : https://httpd.apache.org/
License : ASL 2.0
Description : The Apache HTTP Server is a powerful, efficient, and extensible
: web server.
First of all, you need to know RedHat’s backporting policy to understand that merely the package version will not tell you if the package has already been fixed in RedHat/Rocky.
And as Rocky rebuilds RedHat’s packages, you can check the errata to see if the package is affected by the vulnerability and if there is a fix available. For example those CVE-2025-53020, CVE-2025-23048, CVE-2025-49812 have not been fixed yet. And example of RedHat 9 /Rocky 9 being not affected by a CVE CVE-2024-43394.
Thank you for your response. As you said CVE-2025-53020, CVE-2025-23048, CVE-2025-49812 are not fixed yet, Could we know the status of these vulnerability fixes somewhere? When will it be released?
As I checked rpm -q --changelog httpd
There is no update since Jan 29 2025.
If we look at the cve-2025-53020, we see that:
a) Red Hat has classified as “Fix referred”, i.e.
A deferred status means that a fix for an affected product version is not guaranteed due to higher-priority development work.
b) They offer no mitigation for it
The description of the CVE states:
In some instances, the Apache HTTP server fails to free memory. Given sufficient time, this may lead to the host operating system killing the web server in order to reclaim memory.
The questions are, what are “some instances” and how long is “sufficient time”?
Such reboots could occur more frequently than the “sufficient time” for that CVE.
(You do run dnf up frequently and do reboot when necessary, don’t you?)
Red Hat has assigned low priority to this CVE. They don’t deem it very serious.
If the issue does affect you, then you could restart the httpd.service frequently, or something.