[El-errata] ELBA-2025-23372 Oracle Linux 8 httpd:2.4 bug fix and enhancement update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Dec 25 03:58:56 UTC 2025


Oracle Linux Bug Fix Advisory ELBA-2025-23372

http://linux.oracle.com/errata/ELBA-2025-23372.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
mod_http2-1.15.7-10.module+el8.10.0+90652+bef864ba.4.x86_64.rpm
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.x86_64.rpm

aarch64:
mod_http2-1.15.7-10.module+el8.10.0+90652+bef864ba.4.aarch64.rpm
mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.aarch64.rpm


SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates/mod_http2-1.15.7-10.module+el8.10.0+90652+bef864ba.4.src.rpm
http://oss.oracle.com/ol8/SRPMS-updates/mod_md-2.0.8-8.module+el8.9.0+90011+2f9c6a23.src.rpm



Description of changes:

httpd
[2.4.37-65.5.0.1]
- Replace index.html with Oracle's index page oracle_index.html

[2.4.37-65.5]
- Resolves: RHEL-99944 - CVE-2025-49812 httpd: HTTP Session Hijack via a TLS upgrade
- Resolves: RHEL-99969 - CVE-2024-47252 httpd: insufficient escaping of
  user-supplied data in mod_ssl
- Resolves: RHEL-99961 - CVE-2025-23048 httpd: access control bypass by trusted
  clients is possible using TLS 1.3 session resumption

mod_http2
[1.15.7-10.4]
- Resolves: RHEL-105186 - httpd:2.4/httpd: untrusted input from a client causes
  an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630)

mod_md
[1:2.0.8-8]
- Resolves: #1832844 - mod_md does not work with ACME server that does not
  provide keyChange or revokeCert resources




More information about the El-errata mailing list