ELSA-2022-9276

ELSA-2022-9276 - httpd:2.4 security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-04-13

Description


[2.4.37-43.0.3.3]
- Resolves: CVE-2021-33193 a crafted method sent through HTTP/2 will
bypass validation [Orabug: 33942809]


Related CVEs


CVE-2021-33193

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 8 (aarch64) httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.src.rpma42be9b0ed6a4cdd489dbeb9ebf0ef82-
httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm5943ebe5e73f7bbd27e782a4f7e1de94-
httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm756c171ac660748dbca033f7a96140aa-
httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm6af34db10c153c1b66d0568fe58a85e6-
httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpme2b6f8319effeae95e6e99de00f9d554-
httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm1b05ce1a4ee3091dd871f9cb24193cc8-
mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm253a294dac0788d3ab9dac6311c3fafb-
mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm8615ae953eb2a1514f48fa881ac54ac9-
mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpmdee1225c457b43396464273c5c5f8241-
mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.aarch64.rpm26d4ce1c5f1ad709dbee049964bc828c-
Oracle Linux 8 (x86_64) httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.src.rpma42be9b0ed6a4cdd489dbeb9ebf0ef82-
httpd-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpmc43a044ed105189ad4341bb69332df05-
httpd-devel-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm9acb4f1f62fed8e066941761d42532c9-
httpd-filesystem-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpm6af34db10c153c1b66d0568fe58a85e6-
httpd-manual-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.noarch.rpme2b6f8319effeae95e6e99de00f9d554-
httpd-tools-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm146c5006fd99f578540219c6de4c767e-
mod_ldap-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm6a3f04d51c2b436969e74ae48c9f9511-
mod_proxy_html-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpmc9483d5e66770b57fc16a9f42e7ef870-
mod_session-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpmd59a36b0d233da509adff784e7ca5905-
mod_ssl-2.4.37-43.0.3.module+el8.5.0+20624+5d3b49d0.3.x86_64.rpm725a96fcfbb30288f67678b8a1b45190-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete