Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2020:4751

Опубликовано: 03 нояб. 2020
Источник: rocky
Оценка: Moderate

Описание

Moderate: httpd:2.4 security, bug fix, and enhancement update

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)

Security Fix(es):

  • httpd: memory corruption on early pushes (CVE-2019-10081)

  • httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)

  • httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)

  • httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)

  • httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)

  • httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)

  • httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)

  • httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)

  • httpd: mod_rewrite potential open redirect (CVE-2019-10098)

  • httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
mod_mdx86_648.module+el8.5.0+695+1fa8055emod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
больше 4 лет назад

ELSA-2020-4751: httpd:2.4 security, bug fix, and enhancement update (MODERATE)

CVSS3: 5.3
ubuntu
больше 6 лет назад

In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.

CVSS3: 4.3
redhat
больше 6 лет назад

In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.

CVSS3: 5.3
nvd
больше 6 лет назад

In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.

CVSS3: 5.3
debian
больше 6 лет назад

In Apache HTTP server versions 2.4.37 and prior, by sending request bo ...