Oracle Linux Security Advisory ELSA-2022-0891

https://linux.oracle.com/errata/ELSA-2022-0891.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
httpd-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm
httpd-devel-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm
httpd-filesystem-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.noarch.rpm
httpd-manual-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.noarch.rpm
httpd-tools-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm
mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.x86_64.rpm
mod_ldap-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm
mod_md-2.0.8-8.module+el8.5.0+20475+4f6a8fd5.x86_64.rpm
mod_proxy_html-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm
mod_session-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm
mod_ssl-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm

aarch64:
httpd-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm
httpd-devel-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm
httpd-filesystem-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.noarch.rpm
httpd-manual-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.noarch.rpm
httpd-tools-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm
mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.aarch64.rpm
mod_ldap-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm
mod_md-2.0.8-8.module+el8.5.0+20475+4f6a8fd5.aarch64.rpm
mod_proxy_html-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm
mod_session-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm
mod_ssl-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm


SRPMS:
https://oss.oracle.com:443/ol8/SRPMS-updates/httpd-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.src.rpm
https://oss.oracle.com:443/ol8/SRPMS-updates/mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.src.rpm
https://oss.oracle.com:443/ol8/SRPMS-updates/mod_md-2.0.8-8.module+el8.5.0+20475+4f6a8fd5.src.rpm

Related CVEs:

CVE-2021-34798
CVE-2021-39275




Description of changes:

httpd
[2.4.37-43.0.2.2]
- Set vstring per ORACLE_SUPPORT_PRODUCT [Orabug: 29892262]
- Replace index.html with Oracle's index page oracle_index.html

[2.4.37-43.2]
- Resolves: #2059256 - CVE-2021-34798 httpd:2.4/httpd: NULL pointer dereference
  via malformed requests
- Resolves: #2059257 - CVE-2021-39275 httpd:2.4/httpd: out-of-bounds write in
  ap_escape_quotes() via malicious input

_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle8: ELSA-2022-0891: httpd Moderate Security Update

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

Summary

httpd [2.4.37-43.0.2.2] - Set vstring per ORACLE_SUPPORT_PRODUCT [Orabug: 29892262] - Replace index.html with Oracle's index page oracle_index.html [2.4.37-43.2] - Resolves: #2059256 - CVE-2021-34798 httpd:2.4/httpd: NULL pointer dereference via malformed requests - Resolves: #2059257 - CVE-2021-39275 httpd:2.4/httpd: out-of-bounds write in ap_escape_quotes() via malicious input

SRPMs

https://oss.oracle.com:443/ol8/SRPMS-updates/httpd-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.src.rpm https://oss.oracle.com:443/ol8/SRPMS-updates/mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.src.rpm https://oss.oracle.com:443/ol8/SRPMS-updates/mod_md-2.0.8-8.module+el8.5.0+20475+4f6a8fd5.src.rpm

x86_64

httpd-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm httpd-devel-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm httpd-filesystem-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.noarch.rpm httpd-manual-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.noarch.rpm httpd-tools-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.x86_64.rpm mod_ldap-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm mod_md-2.0.8-8.module+el8.5.0+20475+4f6a8fd5.x86_64.rpm mod_proxy_html-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm mod_session-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm mod_ssl-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.x86_64.rpm

aarch64

httpd-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm httpd-devel-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm httpd-filesystem-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.noarch.rpm httpd-manual-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.noarch.rpm httpd-tools-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm mod_http2-1.15.7-3.module+el8.4.0+20024+b87b2deb.aarch64.rpm mod_ldap-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm mod_md-2.0.8-8.module+el8.5.0+20475+4f6a8fd5.aarch64.rpm mod_proxy_html-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm mod_session-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm mod_ssl-2.4.37-43.0.2.module+el8.5.0+20518+d9453e37.2.aarch64.rpm

i386

Severity
Related CVEs: CVE-2021-34798 CVE-2021-39275

Related News