Описание
ELSA-2022-1915: httpd:2.4 security and bug fix update (MODERATE)
mod_http2 [1.15.7-5]
- Resolves: #2035030 - CVE-2021-44224 httpd:2.4/httpd: possible NULL dereference or SSRF in forward proxy configurations
[1.15.7-4]
- Resolves: #1966728 - CVE-2021-33193 httpd:2.4/mod_http2: httpd: Request splitting via HTTP/2 method injection and mod_proxy
mod_md
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
Module httpd:2.4 is enabled
httpd
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
httpd-devel
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
httpd-filesystem
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
httpd-manual
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
httpd-tools
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
mod_http2
1.15.7-5.module+el8.6.0+20548+01710940
mod_ldap
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
mod_md
2.0.8-8.module+el8.5.0+20475+4f6a8fd5
mod_proxy_html
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
mod_session
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
mod_ssl
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
Oracle Linux x86_64
Module httpd:2.4 is enabled
httpd
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
httpd-devel
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
httpd-filesystem
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
httpd-manual
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
httpd-tools
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
mod_http2
1.15.7-5.module+el8.6.0+20548+01710940
mod_ldap
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
mod_md
2.0.8-8.module+el8.5.0+20475+4f6a8fd5
mod_proxy_html
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
mod_session
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
mod_ssl
2.4.37-47.0.1.module+el8.6.0+20649+083145da.1
Связанные уязвимости
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).