First published: Tue Oct 01 2019(Updated: )
This release adds the new Apache HTTP Server 2.4.29 Service Pack 3 packages that are part of the JBoss Core Services offering.<br>This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2, and includes security and bug fixes. Refer to the Release Notes for information on the component upgrades included in this release.<br>Security Fix(es):<br><li> mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)</li> <li> mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)</li> Bug Fix(es):<br><li> nghttp2: Rebase to 1.39.2</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:2950 is classified as important.
To fix RHSA-2019:2950, you should upgrade to the latest version of the Apache HTTP Server 2.4.29 Service Pack 3 packages.
RHSA-2019:2950 addresses several security vulnerabilities identified in previous versions of the Apache HTTP Server.
Yes, applying RHSA-2019:2950 is strongly recommended to maintain security and stability.
RHSA-2019:2950 affects all installations of Red Hat JBoss Core Services that utilize Apache HTTP Server 2.4.29 SP2.