ELSA-2022-9276

ELSA-2022-9276 - httpd:2.4 security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2022-04-13

Description


[2.4.37-43.0.3.3]
- Resolves: CVE-2021-33193 a crafted method sent through HTTP/2 will
bypass validation [Orabug: 33942809]


Related CVEs


CVE-2021-33193

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.src.rpm0a82d5caa8c0aa9f3efeb6ecc1e49717e6012de4b3aab16e52130c79481cfadc-ol8_aarch64_appstream
httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm80509041d4985c06a06dec632bb0a311ce44e2ab2bc5c0719de3105881612459-ol8_aarch64_appstream
httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm118f724c9adaa87507c838411c49896693f6c53d2ff3bc46c19199503951cc6e-ol8_aarch64_appstream
httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm944f068a86733f572bdbcbfd4c4d6b36441ede6512bb19f39b5eda7d303f6c94-ol8_aarch64_appstream
httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm6e16800827306fb6e40fc14e2c53682f2461bcc6f086837d45f21322033acad7-ol8_aarch64_appstream
httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpmf04ca0f95ea2a58a8334c02142ba39c0b2f861ee3ce53e2c5f66f3db65d31a8c-ol8_aarch64_appstream
mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm3c88d84efef943a7fd3cdd5c593e360e7270a09a22a8966ab4dd8408a3af10d1-ol8_aarch64_appstream
mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm3cbfcaeff873a7d0fe48c6072695ed5257e620a846fd9c86a8e52af5e8d80ec5-ol8_aarch64_appstream
mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpmfef046b4057841da6df62b542d033f2e63e7825525c57b9318ea2524defe27fe-ol8_aarch64_appstream
mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm1c7d4f6f6c0f7e838d5745a83548e8bd0ef306e094fa18bdc84e5b89d1799f90-ol8_aarch64_appstream
Oracle Linux 8 (x86_64) httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.src.rpm0a82d5caa8c0aa9f3efeb6ecc1e49717e6012de4b3aab16e52130c79481cfadc-ol8_x86_64_appstream
httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpmec790cf63ca06f6e507d2f194af29327cfe12d70f3f5aff1dcaa0b31c416d10c-ol8_x86_64_appstream
httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpmebdd2a2f91a46e9a218e2941821f5ba85fd1a759ecd395ef0794a2147e93e13c-ol8_x86_64_appstream
httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm944f068a86733f572bdbcbfd4c4d6b36441ede6512bb19f39b5eda7d303f6c94-ol8_x86_64_appstream
httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm6e16800827306fb6e40fc14e2c53682f2461bcc6f086837d45f21322033acad7-ol8_x86_64_appstream
httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpmfd59fc88f93a3dfd0549b5078579b482eaef72c68842a25733a7f3aab78c63f1-ol8_x86_64_appstream
mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm18ac25ebb96f5fed988b199e4a500fda06874d18f85b612a4763860463ffce1b-ol8_x86_64_appstream
mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm98553256015dc578a1bbd32276d20d83cc53e0eb4287dfb322b54fb0cca03ab3-ol8_x86_64_appstream
mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm659786d48896de4f21f188b3084710a584c0623be86300d808d2579dfc73df47-ol8_x86_64_appstream
mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpmb5940e56ad705528469d84c5b347d4707b0cdcc50c87f534e97dea152c62beaa-ol8_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete