First published: Tue Oct 01 2019(Updated: )
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.<br>This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 Service Pack 3 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.29, and includes bug fixes for CVEs which are linked in the References section.<br>Security Fix(es):<br><li> mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)</li> <li> mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)</li> Bug Fix(es):<br><li> nghttp2: Rebase to 1.39.2</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <2.4.29-41.jbcs.el7 | 2.4.29-41.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <1.39.2-1.jbcs.el7 | 1.39.2-1.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <2.4.29-41.jbcs.el7 | 2.4.29-41.jbcs.el7 |
redhat/jbcs-httpd24-httpd-debuginfo | <2.4.29-41.jbcs.el7 | 2.4.29-41.jbcs.el7 |
redhat/jbcs-httpd24-httpd-devel | <2.4.29-41.jbcs.el7 | 2.4.29-41.jbcs.el7 |
redhat/jbcs-httpd24-httpd-manual | <2.4.29-41.jbcs.el7 | 2.4.29-41.jbcs.el7 |
redhat/jbcs-httpd24-httpd-selinux | <2.4.29-41.jbcs.el7 | 2.4.29-41.jbcs.el7 |
redhat/jbcs-httpd24-httpd-tools | <2.4.29-41.jbcs.el7 | 2.4.29-41.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <1.39.2-1.jbcs.el7 | 1.39.2-1.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2-debuginfo | <1.39.2-1.jbcs.el7 | 1.39.2-1.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2-devel | <1.39.2-1.jbcs.el7 | 1.39.2-1.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <1.39.2-1.jbcs.el6 | 1.39.2-1.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-httpd-debuginfo | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-httpd-devel | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-httpd-manual | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-httpd-selinux | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-httpd-tools | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <1.39.2-1.jbcs.el6 | 1.39.2-1.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2-debuginfo | <1.39.2-1.jbcs.el6 | 1.39.2-1.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2-devel | <1.39.2-1.jbcs.el6 | 1.39.2-1.jbcs.el6 |
redhat/jbcs-httpd24-httpd-debuginfo | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-httpd-devel | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-httpd-selinux | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-httpd-tools | <2.4.29-41.jbcs.el6 | 2.4.29-41.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2-debuginfo | <1.39.2-1.jbcs.el6 | 1.39.2-1.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2-devel | <1.39.2-1.jbcs.el6 | 1.39.2-1.jbcs.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:2946 is classified as important.
To fix RHSA-2019:2946, upgrade to the specified fixed versions of the affected packages.
Affected packages under RHSA-2019:2946 include jbcs-httpd24-httpd and jbcs-httpd24-nghttp2 among others.
Versions up to but not including 2.4.29-41.jbcs.el7 are vulnerable as per RHSA-2019:2946.
RHSA-2019:2946 was released on September 18, 2019.