Advisory Published

RHSA-2018:3558: Moderate: httpd24 security, bug fix, and enhancement update

First published: Tue Nov 13 2018(Updated: )

The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module.<br>The following packages have been upgraded to a later upstream version: httpd24-httpd (2.4.34), httpd24-curl (7.61.1). (BZ#1590833, BZ#1648928)<br>Security Fix(es):<br><li> httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications (CVE-2018-1283)</li> <li> httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS (CVE-2018-1303)</li> <li> httpd: mod_http2: Too much time allocated to workers, possibly leading to DoS (CVE-2018-1333)</li> <li> httpd: DoS for HTTP/2 connections by continuous SETTINGS frames (CVE-2018-11763)</li> <li> httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values (CVE-2017-15710)</li> <li> httpd: &lt;FilesMatch&gt; bypass with a trailing newline in the file name (CVE-2017-15715)</li> <li> httpd: Out of bounds access after failure in reading the HTTP request (CVE-2018-1301)</li> <li> httpd: Weak Digest auth nonce generation in mod_auth_digest (CVE-2018-1312)</li> <li> curl: Multiple security issues were fixed in httpd24-curl (CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9586, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000254, CVE-2017-1000257, CVE-2017-7407, CVE-2017-8816, CVE-2017-8817, CVE-2018-1000007, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000301, CVE-2018-14618)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.<br>Red Hat would like to thank the Curl project for reporting CVE-2017-8816, CVE-2017-8817, CVE-2017-1000254, CVE-2017-1000257, CVE-2018-1000007, CVE-2018-1000120, CVE-2018-1000122, CVE-2018-1000301, CVE-2016-9586, CVE-2017-1000100, CVE-2017-1000101, CVE-2018-14618, and CVE-2018-1000121. Upstream acknowledges Alex Nichols as the original reporter of CVE-2017-8816; the OSS-Fuzz project as the original reporter of CVE-2017-8817 and CVE-2018-1000301; Max Dymond as the original reporter of CVE-2017-1000254 and CVE-2018-1000122; Brian Carpenter and the OSS-Fuzz project as the original reporters of CVE-2017-1000257; Craig de Stigter as the original reporter of CVE-2018-1000007; Duy Phan Thanh as the original reporter of CVE-2018-1000120; Even Rouault as the original reporter of CVE-2017-1000100; Brian Carpenter as the original reporter of CVE-2017-1000101; Zhaoyang Wu as the original reporter of CVE-2018-14618; and Dario Weisser as the original reporter of CVE-2018-1000121.<br>Bug Fix(es):<br><li> Previously, the Apache HTTP Server from the httpd24 Software Collection was unable to handle situations when static content was repeatedly requested in a browser by refreshing the page. As a consequence, HTTP/2 connections timed out and httpd became unresponsive. This bug has been fixed, and HTTP/2 connections now work as expected in the described scenario. (BZ#1518737)</li> Enhancement(s):<br><li> This update adds the mod_md module to the httpd24 Software Collection. This module enables managing domains across virtual hosts and certificate provisioning using the Automatic Certificate Management Environment (ACME) protocol. The mod_md module is available only for Red Hat Enterprise Linux 7. (BZ#1640722)</li> Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Software Collections 3.2 Release Notes linked from the References section.

Affected SoftwareAffected VersionHow to fix
redhat/httpd24-curl<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-httpd<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-nghttp2<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-curl<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-curl-debuginfo<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-httpd<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-httpd-debuginfo<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-httpd-devel<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-httpd-manual<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-httpd-tools<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-libcurl<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-libcurl-devel<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-libnghttp2<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-libnghttp2-devel<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-nghttp2<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-nghttp2-debuginfo<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-curl-debuginfo<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-httpd-debuginfo<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-httpd-devel<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-httpd-tools<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-libcurl<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-libcurl-devel<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-libnghttp2<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-libnghttp2-devel<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-nghttp2-debuginfo<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-curl<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-curl-debuginfo<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-httpd<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-httpd-debuginfo<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-httpd-devel<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-httpd-tools<2.4.34-7.el7
2.4.34-7.el7
redhat/httpd24-libcurl<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-libcurl-devel<7.61.1-1.el7
7.61.1-1.el7
redhat/httpd24-libnghttp2<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-libnghttp2-devel<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-nghttp2<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-nghttp2-debuginfo<1.7.1-7.el7
1.7.1-7.el7
redhat/httpd24-curl<7.61.1-1.el7.aa
7.61.1-1.el7.aa
redhat/httpd24-curl-debuginfo<7.61.1-1.el7.aa
7.61.1-1.el7.aa
redhat/httpd24-httpd<2.4.34-7.el7.aa
2.4.34-7.el7.aa
redhat/httpd24-httpd-debuginfo<2.4.34-7.el7.aa
2.4.34-7.el7.aa
redhat/httpd24-httpd-devel<2.4.34-7.el7.aa
2.4.34-7.el7.aa
redhat/httpd24-httpd-tools<2.4.34-7.el7.aa
2.4.34-7.el7.aa
redhat/httpd24-libcurl<7.61.1-1.el7.aa
7.61.1-1.el7.aa
redhat/httpd24-libcurl-devel<7.61.1-1.el7.aa
7.61.1-1.el7.aa
redhat/httpd24-libnghttp2<1.7.1-7.el7.aa
1.7.1-7.el7.aa
redhat/httpd24-libnghttp2-devel<1.7.1-7.el7.aa
1.7.1-7.el7.aa
redhat/httpd24-nghttp2<1.7.1-7.el7.aa
1.7.1-7.el7.aa
redhat/httpd24-nghttp2-debuginfo<1.7.1-7.el7.aa
1.7.1-7.el7.aa
redhat/httpd24-curl<7.61.1-1.el6
7.61.1-1.el6
redhat/httpd24-httpd<2.4.34-7.el6
2.4.34-7.el6
redhat/httpd24-nghttp2<1.7.1-7.el6
1.7.1-7.el6
redhat/httpd24-curl<7.61.1-1.el6
7.61.1-1.el6
redhat/httpd24-curl-debuginfo<7.61.1-1.el6
7.61.1-1.el6
redhat/httpd24-httpd<2.4.34-7.el6
2.4.34-7.el6
redhat/httpd24-httpd-debuginfo<2.4.34-7.el6
2.4.34-7.el6
redhat/httpd24-httpd-devel<2.4.34-7.el6
2.4.34-7.el6
redhat/httpd24-httpd-manual<2.4.34-7.el6
2.4.34-7.el6
redhat/httpd24-httpd-tools<2.4.34-7.el6
2.4.34-7.el6
redhat/httpd24-libcurl<7.61.1-1.el6
7.61.1-1.el6
redhat/httpd24-libcurl-devel<7.61.1-1.el6
7.61.1-1.el6
redhat/httpd24-libnghttp2<1.7.1-7.el6
1.7.1-7.el6
redhat/httpd24-libnghttp2-devel<1.7.1-7.el6
1.7.1-7.el6
redhat/httpd24-nghttp2<1.7.1-7.el6
1.7.1-7.el6
redhat/httpd24-nghttp2-debuginfo<1.7.1-7.el6
1.7.1-7.el6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203