Oracle8: ELSA-2022-9276: httpd Important Security Update | LinuxSec...
Oracle Linux Security Advisory ELSA-2022-9276

https://linux.oracle.com/errata/ELSA-2022-9276.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm
httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm
httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm
mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm

aarch64:
httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm
httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm
httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm
mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm


SRPMS:
https://oss.oracle.com/ol8/SRPMS-updates/httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.src.rpm

Related CVEs:

CVE-2021-33193




Description of changes:

[2.4.37-43.0.3.3]
- Resolves: CVE-2021-33193 a crafted method sent through HTTP/2 will
  bypass validation [Orabug: 33942809]

_______________________________________________
El-errata mailing list
[email protected]
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle8: ELSA-2022-9276: httpd Important Security Update

Summary

Description of changes: [2.4.37-43.0.3.3] - Resolves: CVE-2021-33193 a crafted method sent through HTTP/2 will bypass validation [Orabug: 33942809]

i386

x86_64

httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm aarch64: httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm

SRPMS

https://oss.oracle.com/ol8/SRPMS-updates/httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.src.rpm

Severity
Related CVEs: CVE-2021-33193

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.