Moderate: httpd24-httpd security, bug fix, and enhancement update

Synopsis

Moderate: httpd24-httpd security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Topic

An update for httpd24, httpd24-httpd, and httpd24-nghttp2 is now available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module.

Security Fix(es):

  • httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199)
  • httpd: mod_auth_digest: access control bypass due to race condition (CVE-2019-0217)
  • httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)
  • httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)
  • httpd: URL normalization inconsistency (CVE-2019-0220)
  • httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • `ExtendedStatus Off` directive when using mod_systemd causes systemctl to hang (BZ#1669213)
  • httpd can not be started with mod_md enabled (BZ#1673019)
  • Rebuild metapackage with latest scl-utils (BZ#1696527)
  • fix a regression introduced in r1740928 (BZ#1707636)
  • duplicated cookie in Apache httpd with mod_session (BZ#1725922)
  • Unexpected OCSP in proxy SSL connection (BZ#1744120)

Enhancement(s):

  • RFE: updated collection for httpd 2.4 (BZ#1726706)

Additional Changes:

For detailed information on changes in this release, see the Red Hat Software Collections 3.4 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon will be restarted automatically.

Affected Products

  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7.7 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7.7 ppc64le
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.6 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7.6 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7.6 ppc64le
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.5 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7.5 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7.5 ppc64le
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7 ppc64le
  • Red Hat Software Collections (for RHEL Server for ARM) 1 aarch64
  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 6 x86_64
  • Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64
  • Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 6 x86_64

Fixes

  • BZ - 1668493 - CVE-2018-17199 httpd: mod_session_cookie does not respect expiry time
  • BZ - 1668497 - CVE-2018-17189 httpd: mod_http2: DoS via slow, unneeded request bodies
  • BZ - 1669213 - `ExtendedStatus Off` directive when using mod_systemd causes systemctl to hang
  • BZ - 1673019 - httpd can not be started with mod_md enabled
  • BZ - 1695020 - CVE-2019-0217 httpd: mod_auth_digest: access control bypass due to race condition
  • BZ - 1695036 - CVE-2019-0220 httpd: URL normalization inconsistency
  • BZ - 1696527 - Rebuild metapackage with latest scl-utils
  • BZ - 1707636 - fix a regression introduced in r1740928
  • BZ - 1725922 - duplicated cookie in Apache httpd with mod_session
  • BZ - 1743956 - CVE-2019-10092 httpd: limited cross-site scripting in mod_proxy error page
  • BZ - 1743996 - CVE-2019-10097 httpd: null-pointer dereference in mod_remoteip
  • BZ - 1744120 - Unexpected OCSP in proxy SSL connection

CVEs

References