Описание
Moderate: httpd:2.4 security, bug fix, and enhancement update
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)
Security Fix(es):
-
httpd: memory corruption on early pushes (CVE-2019-10081)
-
httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)
-
httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)
-
httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)
-
httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)
-
httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)
-
httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)
-
httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)
-
httpd: mod_rewrite potential open redirect (CVE-2019-10098)
-
httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Затронутые продукты
Rocky Linux 8
Ссылки на источники
Исправления
- Red Hat - 1209162
- Red Hat - 1668497
- Red Hat - 1695030
- Red Hat - 1695042
- Red Hat - 1743956
- Red Hat - 1743959
- Red Hat - 1743966
- Red Hat - 1743974
- Red Hat - 1743996
- Red Hat - 1771847
- Red Hat - 1814236
- Red Hat - 1820761
- Red Hat - 1820772
- Red Hat - 1832844
Связанные уязвимости
ELSA-2020-4751: httpd:2.4 security, bug fix, and enhancement update (MODERATE)
In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.
In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.
In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.
In Apache HTTP server versions 2.4.37 and prior, by sending request bo ...