Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2024-05-24 |
httpd
[2.4.37-64.0.1]
- Replace index.html with Oracle's index page oracle_index.html
[2.4.37-64]
- Resolves: RHEL-14448 - httpd: mod_macro: out-of-bounds read
vulnerability (CVE-2023-31122)
[2.4.37-63]
- mod_xml2enc: fix media type handling
Resolves: RHEL-14321
mod_http2
[1.15.7-10]
- Resolves: RHEL-29817 - httpd:2.4/mod_http2: httpd: CONTINUATION frames
DoS (CVE-2024-27316)
[1.15.7-9.3]
- Resolves: RHEL-13367 - httpd:2.4/mod_http2: reset requests exhaust memory
(incomplete fix of CVE-2023-44487)(CVE-2023-45802)
[1.15.7-8.3]
- Resolves: #2177748 - CVE-2023-25690 httpd:2.4/httpd: HTTP request splitting
with mod_rewrite and mod_proxy
[1.15.7-7]
- Resolves: #2095650 - Dependency from mod_http2 on httpd broken
[1.15.7-6]
- Backport SNI feature refactor
- Resolves: rhbz#2137257
[1.15.7-5]
- Resolves: #2035030 - CVE-2021-44224 httpd:2.4/httpd: possible NULL dereference
or SSRF in forward proxy configurations
[1.15.7-4]
- Resolves: #1966728 - CVE-2021-33193 httpd:2.4/mod_http2: httpd:
Request splitting via HTTP/2 method injection and mod_proxy
[1.15.7-3]
- Resolves: #1869077 - CVE-2020-11993 httpd:2.4/mod_http2: httpd:
mod_http2 concurrent pool usage
[1.15.7-2]
- Resolves: #1869073 - CVE-2020-9490 httpd:2.4/mod_http2: httpd:
Push diary crash on specifically crafted HTTP/2 header
[1.15.7-1]
- new version 1.15.7
- Resolves: #1814236 - RFE: mod_http2 rebase
- Resolves: #1747289 - CVE-2019-10082 httpd:2.4/mod_http2: httpd:
read-after-free in h2 connection shutdown
- Resolves: #1696099 - CVE-2019-0197 httpd:2.4/mod_http2: httpd:
mod_http2: possible crash on late upgrade
- Resolves: #1696094 - CVE-2019-0196 httpd:2.4/mod_http2: httpd:
mod_http2: read-after-free on a string compare
- Resolves: #1677591 - CVE-2018-17189 httpd:2.4/mod_http2: httpd:
mod_http2: DoS via slow, unneeded request bodies
[1.11.3-3]
- Resolves: #1744999 - CVE-2019-9511 httpd:2.4/mod_http2: HTTP/2: large amount
of data request leads to denial of service
- Resolves: #1745086 - CVE-2019-9516 httpd:2.4/mod_http2: HTTP/2: 0-length
headers leads to denial of service
- Resolves: #1745154 - CVE-2019-9517 httpd:2.4/mod_http2: HTTP/2: request for
large response leads to denial of service
[1.11.3-2]
- update release (#1695587)
[1.11.3-1]
- new version 1.11.3
- Resolves: #1633401 - CVE-2018-11763 mod_http2: httpd: DoS for HTTP/2
connections by continuous SETTINGS
[1.10.20-1]
- update to 1.10.20
[1.10.18-1]
- update to 1.10.18
[1.10.16-1]
- update to 1.10.16 (CVE-2018-1302)
[1.10.13-2]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
[1.10.13-1]
- update to 1.10.13
[1.10.12-1]
- update to 1.10.12
[1.10.10-2]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
[1.10.10-1]
- update to 1.10.10
[1.10.7-2]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
[1.10.7-1]
- update to 1.10.7
[1.10.6-1]
- update to 1.10.6
[1.10.5-1]
- update to 1.10.5
[1.10.1-1]
- Initial import (#1440780).
mod_md
CVE-2023-31122 |
CVE-2023-45802 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory | Channel Label |
Oracle Linux 8 (aarch64) | httpd-2.4.37-64.module+el8.10.0+90271+3bc76a16.src.rpm | 23fbf7377322831023ecc5b6f14dbabf | - | ol8_aarch64_appstream |
mod_http2-1.15.7-10.module+el8.10.0+90327+96b8ea28.src.rpm | cfad3ce0620e49673cb9c5f948265264 | - | ol8_aarch64_appstream | |
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.src.rpm | 57baf2f70c9de0a1ab3a4a39fb97b4a0 | - | ol8_aarch64_appstream | |
httpd-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm | aa8b4acc7e1abb3b466d9e31f1e41f85 | - | ol8_aarch64_appstream | |
httpd-devel-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm | a7b05afa552f644940fbfdb131203d39 | - | ol8_aarch64_appstream | |
httpd-filesystem-2.4.37-64.module+el8.10.0+90271+3bc76a16.noarch.rpm | ae6e3b130b58fe1c86eac3932f6fba79 | - | ol8_aarch64_appstream | |
httpd-manual-2.4.37-64.module+el8.10.0+90271+3bc76a16.noarch.rpm | d9a7ad93811f5b95d65f0ad8a545659e | - | ol8_aarch64_appstream | |
httpd-tools-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm | 0015920dcca7b3f42b224d66ab5688ad | - | ol8_aarch64_appstream | |
mod_http2-1.15.7-10.module+el8.10.0+90327+96b8ea28.aarch64.rpm | 7a4232cd2fee5cf07d4b6cfd120ae5e8 | - | ol8_aarch64_appstream | |
mod_ldap-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm | 7e98f4c0de8f19956b10afb5fac51894 | - | ol8_aarch64_appstream | |
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.aarch64.rpm | e0cdd2c7bbe8ba7cf3614b973dd7eb66 | - | ol8_aarch64_appstream | |
mod_proxy_html-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm | f78f968b748194226361a602f7f3ff8f | - | ol8_aarch64_appstream | |
mod_session-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm | fef4d863f75a907934c5f44c7842f2cb | - | ol8_aarch64_appstream | |
mod_ssl-2.4.37-64.module+el8.10.0+90271+3bc76a16.aarch64.rpm | 66c14b2ff844d7f338ea13239accec84 | - | ol8_aarch64_appstream | |
Oracle Linux 8 (x86_64) | httpd-2.4.37-64.module+el8.10.0+90271+3bc76a16.src.rpm | 23fbf7377322831023ecc5b6f14dbabf | - | ol8_x86_64_appstream |
mod_http2-1.15.7-10.module+el8.10.0+90327+96b8ea28.src.rpm | cfad3ce0620e49673cb9c5f948265264 | - | ol8_x86_64_appstream | |
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.src.rpm | 57baf2f70c9de0a1ab3a4a39fb97b4a0 | - | ol8_x86_64_appstream | |
httpd-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm | 2c4951eacdc2b3ba89efa8647b986ab3 | - | ol8_x86_64_appstream | |
httpd-devel-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm | 3989a2fba9135564ae61dd09e64079b6 | - | ol8_x86_64_appstream | |
httpd-filesystem-2.4.37-64.module+el8.10.0+90271+3bc76a16.noarch.rpm | ae6e3b130b58fe1c86eac3932f6fba79 | - | ol8_x86_64_appstream | |
httpd-manual-2.4.37-64.module+el8.10.0+90271+3bc76a16.noarch.rpm | d9a7ad93811f5b95d65f0ad8a545659e | - | ol8_x86_64_appstream | |
httpd-tools-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm | 52301d576479ed603e70b79f6eca9c2b | - | ol8_x86_64_appstream | |
mod_http2-1.15.7-10.module+el8.10.0+90327+96b8ea28.x86_64.rpm | ad14667bc0eddafff0e6adcad3f51b6b | - | ol8_x86_64_appstream | |
mod_ldap-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm | 6cf688c4b9e057c3069fad79038b5b3c | - | ol8_x86_64_appstream | |
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.x86_64.rpm | 50f77dc288425f1cdee5d05760c7dccb | - | ol8_x86_64_appstream | |
mod_proxy_html-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm | e28fa8d3afd76570ddd014606d54a195 | - | ol8_x86_64_appstream | |
mod_session-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm | dcd727559858a8c6809d9c3926c001cd | - | ol8_x86_64_appstream | |
mod_ssl-2.4.37-64.module+el8.10.0+90271+3bc76a16.x86_64.rpm | 1bc6cd2bde9f95ce48557051494f6e9d | - | ol8_x86_64_appstream |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team