First published: Tue Nov 03 2020(Updated: )
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.<br>The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)<br>Security Fix(es):<br><li> httpd: memory corruption on early pushes (CVE-2019-10081)</li> <li> httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)</li> <li> httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)</li> <li> httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)</li> <li> httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)</li> <li> httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)</li> <li> httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)</li> <li> httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)</li> <li> httpd: mod_rewrite potential open redirect (CVE-2019-10098)</li> <li> httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-debuginfo | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-debugsource | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-devel | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-filesystem | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-manual | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-tools | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-tools-debuginfo | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-debuginfo | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-debugsource | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-devel | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-tools | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-tools-debuginfo | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-debuginfo | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-debugsource | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-devel | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-tools | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd-tools-debuginfo | <2.4.37-30.module+el8.3.0+7001+0766b9e7 | 2.4.37-30.module+el8.3.0+7001+0766b9e7 |
redhat/httpd | <2.4.37-30.module+el8.3.0+7001+0766b9e7.aa | 2.4.37-30.module+el8.3.0+7001+0766b9e7.aa |
redhat/httpd-debuginfo | <2.4.37-30.module+el8.3.0+7001+0766b9e7.aa | 2.4.37-30.module+el8.3.0+7001+0766b9e7.aa |
redhat/httpd-debugsource | <2.4.37-30.module+el8.3.0+7001+0766b9e7.aa | 2.4.37-30.module+el8.3.0+7001+0766b9e7.aa |
redhat/httpd-devel | <2.4.37-30.module+el8.3.0+7001+0766b9e7.aa | 2.4.37-30.module+el8.3.0+7001+0766b9e7.aa |
redhat/httpd-tools | <2.4.37-30.module+el8.3.0+7001+0766b9e7.aa | 2.4.37-30.module+el8.3.0+7001+0766b9e7.aa |
redhat/httpd-tools-debuginfo | <2.4.37-30.module+el8.3.0+7001+0766b9e7.aa | 2.4.37-30.module+el8.3.0+7001+0766b9e7.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.