Oracle Linux Security Advisory ELSA-2022-9276

http://linux.oracle.com/errata/ELSA-2022-9276.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm
httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm
httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm

aarch64:
httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm
httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm
httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm


SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.src.rpm

Related CVEs:

CVE-2021-33193




Description of changes:

[2.4.37-43.0.3.3]
- Resolves: CVE-2021-33193 a crafted method sent through HTTP/2 will
  bypass validation [Orabug: 33942809]

_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle8: ELSA-2022-9276: httpd Important Security Update

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

Summary

[2.4.37-43.0.3.3] - Resolves: CVE-2021-33193 a crafted method sent through HTTP/2 will bypass validation [Orabug: 33942809]

SRPMs

http://oss.oracle.com/ol8/SRPMS-updates/httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.src.rpm

x86_64

httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm

aarch64

httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm

i386

Severity
Related CVEs: CVE-2021-33193

Related News