ELSA-2024-3121

ELSA-2024-3121 - httpd:2.4 security update

Type:SECURITY
Severity:MODERATE
Release Date:2024-05-24

Description


httpd
[2.4.37-64.0.1]
- Replace index.html with Oracle's index page oracle_index.html

[2.4.37-64]
- Resolves: RHEL-14448 - httpd: mod_macro: out-of-bounds read
vulnerability (CVE-2023-31122)

[2.4.37-63]
- mod_xml2enc: fix media type handling
Resolves: RHEL-14321

mod_http2
[1.15.7-10]
- Resolves: RHEL-29817 - httpd:2.4/mod_http2: httpd: CONTINUATION frames
DoS (CVE-2024-27316)

[1.15.7-9.3]
- Resolves: RHEL-13367 - httpd:2.4/mod_http2: reset requests exhaust memory
(incomplete fix of CVE-2023-44487)(CVE-2023-45802)

[1.15.7-8.3]
- Resolves: #2177748 - CVE-2023-25690 httpd:2.4/httpd: HTTP request splitting
with mod_rewrite and mod_proxy

[1.15.7-7]
- Resolves: #2095650 - Dependency from mod_http2 on httpd broken

[1.15.7-6]
- Backport SNI feature refactor
- Resolves: rhbz#2137257

[1.15.7-5]
- Resolves: #2035030 - CVE-2021-44224 httpd:2.4/httpd: possible NULL dereference
or SSRF in forward proxy configurations

[1.15.7-4]
- Resolves: #1966728 - CVE-2021-33193 httpd:2.4/mod_http2: httpd:
Request splitting via HTTP/2 method injection and mod_proxy

[1.15.7-3]
- Resolves: #1869077 - CVE-2020-11993 httpd:2.4/mod_http2: httpd:
mod_http2 concurrent pool usage

[1.15.7-2]
- Resolves: #1869073 - CVE-2020-9490 httpd:2.4/mod_http2: httpd:
Push diary crash on specifically crafted HTTP/2 header

[1.15.7-1]
- new version 1.15.7
- Resolves: #1814236 - RFE: mod_http2 rebase
- Resolves: #1747289 - CVE-2019-10082 httpd:2.4/mod_http2: httpd:
read-after-free in h2 connection shutdown
- Resolves: #1696099 - CVE-2019-0197 httpd:2.4/mod_http2: httpd:
mod_http2: possible crash on late upgrade
- Resolves: #1696094 - CVE-2019-0196 httpd:2.4/mod_http2: httpd:
mod_http2: read-after-free on a string compare
- Resolves: #1677591 - CVE-2018-17189 httpd:2.4/mod_http2: httpd:
mod_http2: DoS via slow, unneeded request bodies

[1.11.3-3]
- Resolves: #1744999 - CVE-2019-9511 httpd:2.4/mod_http2: HTTP/2: large amount
of data request leads to denial of service
- Resolves: #1745086 - CVE-2019-9516 httpd:2.4/mod_http2: HTTP/2: 0-length
headers leads to denial of service
- Resolves: #1745154 - CVE-2019-9517 httpd:2.4/mod_http2: HTTP/2: request for
large response leads to denial of service

[1.11.3-2]
- update release (#1695587)

[1.11.3-1]
- new version 1.11.3
- Resolves: #1633401 - CVE-2018-11763 mod_http2: httpd: DoS for HTTP/2
connections by continuous SETTINGS

[1.10.20-1]
- update to 1.10.20

[1.10.18-1]
- update to 1.10.18

[1.10.16-1]
- update to 1.10.16 (CVE-2018-1302)

[1.10.13-2]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild

[1.10.13-1]
- update to 1.10.13

[1.10.12-1]
- update to 1.10.12

[1.10.10-2]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild

[1.10.10-1]
- update to 1.10.10

[1.10.7-2]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild

[1.10.7-1]
- update to 1.10.7

[1.10.6-1]
- update to 1.10.6

[1.10.5-1]
- update to 1.10.5

[1.10.1-1]
- Initial import (#1440780).

mod_md


Related CVEs


CVE-2023-31122
CVE-2023-45802

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) httpd-2.4.37-64.module+el8.10.0+90271+3bc76a16.src.rpm23fbf7377322831023ecc5b6f14dbabf-ol8_aarch64_appstream
mod_http2-1.15.7-10.module+el8.10.0+90327+96b8ea28.src.rpmcfad3ce0620e49673cb9c5f948265264-ol8_aarch64_appstream
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.src.rpm57baf2f70c9de0a1ab3a4a39fb97b4a0-ol8_aarch64_appstream
httpd-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpmaa8b4acc7e1abb3b466d9e31f1e41f85-ol8_aarch64_appstream
httpd-devel-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpma7b05afa552f644940fbfdb131203d39-ol8_aarch64_appstream
httpd-filesystem-2.4.37-64.module+el8.10.0+90271+3bc76a16.noarch.rpmae6e3b130b58fe1c86eac3932f6fba79-ol8_aarch64_appstream
httpd-manual-2.4.37-64.module+el8.10.0+90271+3bc76a16.noarch.rpmd9a7ad93811f5b95d65f0ad8a545659e-ol8_aarch64_appstream
httpd-tools-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm0015920dcca7b3f42b224d66ab5688ad-ol8_aarch64_appstream
mod_http2-1.15.7-10.module+el8.10.0+90327+96b8ea28.aarch64.rpm7a4232cd2fee5cf07d4b6cfd120ae5e8-ol8_aarch64_appstream
mod_ldap-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm7e98f4c0de8f19956b10afb5fac51894-ol8_aarch64_appstream
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.aarch64.rpme0cdd2c7bbe8ba7cf3614b973dd7eb66-ol8_aarch64_appstream
mod_proxy_html-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpmf78f968b748194226361a602f7f3ff8f-ol8_aarch64_appstream
mod_session-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpmfef4d863f75a907934c5f44c7842f2cb-ol8_aarch64_appstream
mod_ssl-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm66c14b2ff844d7f338ea13239accec84-ol8_aarch64_appstream
Oracle Linux 8 (x86_64) httpd-2.4.37-64.module+el8.10.0+90271+3bc76a16.src.rpm23fbf7377322831023ecc5b6f14dbabf-ol8_x86_64_appstream
mod_http2-1.15.7-10.module+el8.10.0+90327+96b8ea28.src.rpmcfad3ce0620e49673cb9c5f948265264-ol8_x86_64_appstream
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.src.rpm57baf2f70c9de0a1ab3a4a39fb97b4a0-ol8_x86_64_appstream
httpd-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm2c4951eacdc2b3ba89efa8647b986ab3-ol8_x86_64_appstream
httpd-devel-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm3989a2fba9135564ae61dd09e64079b6-ol8_x86_64_appstream
httpd-filesystem-2.4.37-64.module+el8.10.0+90271+3bc76a16.noarch.rpmae6e3b130b58fe1c86eac3932f6fba79-ol8_x86_64_appstream
httpd-manual-2.4.37-64.module+el8.10.0+90271+3bc76a16.noarch.rpmd9a7ad93811f5b95d65f0ad8a545659e-ol8_x86_64_appstream
httpd-tools-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm52301d576479ed603e70b79f6eca9c2b-ol8_x86_64_appstream
mod_http2-1.15.7-10.module+el8.10.0+90327+96b8ea28.x86_64.rpmad14667bc0eddafff0e6adcad3f51b6b-ol8_x86_64_appstream
mod_ldap-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm6cf688c4b9e057c3069fad79038b5b3c-ol8_x86_64_appstream
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.x86_64.rpm50f77dc288425f1cdee5d05760c7dccb-ol8_x86_64_appstream
mod_proxy_html-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpme28fa8d3afd76570ddd014606d54a195-ol8_x86_64_appstream
mod_session-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpmdcd727559858a8c6809d9c3926c001cd-ol8_x86_64_appstream
mod_ssl-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm1bc6cd2bde9f95ce48557051494f6e9d-ol8_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete