Oracle Linux Security Advisory ELSA-2021-3816

https://linux.oracle.com/errata/ELSA-2021-3816.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
httpd-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm
httpd-devel-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm
httpd-filesystem-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.noarch.rpm
httpd-manual-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.noarch.rpm
httpd-tools-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm
mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.x86_64.rpm
mod_ldap-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm
mod_md-2.0.8-8.module+el8.3.0+7816+49791cfd.x86_64.rpm
mod_proxy_html-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm
mod_session-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm
mod_ssl-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm

aarch64:
httpd-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm
httpd-devel-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm
httpd-filesystem-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.noarch.rpm
httpd-manual-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.noarch.rpm
httpd-tools-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm
mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.aarch64.rpm
mod_ldap-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm
mod_md-2.0.8-8.module+el8.3.0+7816+49791cfd.aarch64.rpm
mod_proxy_html-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm
mod_session-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm
mod_ssl-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm


SRPMS:
https://oss.oracle.com:443/ol8/SRPMS-updates/httpd-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.src.rpm
https://oss.oracle.com:443/ol8/SRPMS-updates/mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.src.rpm
https://oss.oracle.com:443/ol8/SRPMS-updates/mod_md-2.0.8-8.module+el8.3.0+7816+49791cfd.src.rpm

Related CVEs:

CVE-2021-26691
CVE-2021-40438




Description of changes:

httpd
[2.4.37-39.1.0.1.1]
- Set vstring per ORACLE_SUPPORT_PRODUCT [Orabug: 29892262]
- Replace index.html with Oracle's index page oracle_index.html

[2.4.37-39.1]
- Resolves: #2007234 - CVE-2021-40438 httpd:2.4/httpd: mod_proxy: SSRF via
  a crafted request uri-path
- Resolves: #2007646 - CVE-2021-26691 httpd:2.4/httpd: Heap overflow in
  mod_session

_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle8: ELSA-2021-3816: httpd Important Security Update

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

Summary

httpd [2.4.37-39.1.0.1.1] - Set vstring per ORACLE_SUPPORT_PRODUCT [Orabug: 29892262] - Replace index.html with Oracle's index page oracle_index.html [2.4.37-39.1] - Resolves: #2007234 - CVE-2021-40438 httpd:2.4/httpd: mod_proxy: SSRF via a crafted request uri-path - Resolves: #2007646 - CVE-2021-26691 httpd:2.4/httpd: Heap overflow in mod_session

SRPMs

https://oss.oracle.com:443/ol8/SRPMS-updates/httpd-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.src.rpm https://oss.oracle.com:443/ol8/SRPMS-updates/mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.src.rpm https://oss.oracle.com:443/ol8/SRPMS-updates/mod_md-2.0.8-8.module+el8.3.0+7816+49791cfd.src.rpm

x86_64

httpd-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm httpd-devel-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm httpd-filesystem-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.noarch.rpm httpd-manual-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.noarch.rpm httpd-tools-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.x86_64.rpm mod_ldap-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm mod_md-2.0.8-8.module+el8.3.0+7816+49791cfd.x86_64.rpm mod_proxy_html-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm mod_session-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm mod_ssl-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.x86_64.rpm

aarch64

httpd-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm httpd-devel-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm httpd-filesystem-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.noarch.rpm httpd-manual-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.noarch.rpm httpd-tools-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.aarch64.rpm mod_ldap-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm mod_md-2.0.8-8.module+el8.3.0+7816+49791cfd.aarch64.rpm mod_proxy_html-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm mod_session-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm mod_ssl-2.4.37-39.0.1.module+el8.4.0+20372+b87b2deb.1.aarch64.rpm

i386

Severity
Related CVEs: CVE-2021-26691 CVE-2021-40438

Related News