RedHat: RHSA-2020-1337:01 Moderate: Red Hat JBoss Core Services Apache HTTP
Summary
This release adds the new Apache HTTP Server 2.4.37 Service Pack 2 packages
that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack
Apache Server 2.4.37 Service Pack 1 and includes bug fixes and
enhancements. Refer to the Release Notes for information on the most
significant bug fixes and enhancements included in this release.
Security Fix(es):
* openssl: side-channel weak encryption vulnerability (CVE-2019-1547)
* httpd: memory corruption on early pushes (CVE-2019-10081)
* httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)
* httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)
* openssl: information disclosure in fork() (CVE-2019-1549)
* openssl: information disclosure in PKCS7_dataDecode and
CMS_decrypt_set1_pkey (CVE-2019-1563)
* httpd: limited cross-site scripting in mod_proxy error page
(CVE-2019-10092)
* httpd: mod_rewrite potential open redirect (CVE-2019-10098)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2019-1547 https://access.redhat.com/security/cve/CVE-2019-1549 https://access.redhat.com/security/cve/CVE-2019-1563 https://access.redhat.com/security/cve/CVE-2019-10081 https://access.redhat.com/security/cve/CVE-2019-10082 https://access.redhat.com/security/cve/CVE-2019-10092 https://access.redhat.com/security/cve/CVE-2019-10097 https://access.redhat.com/security/cve/CVE-2019-10098 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/
Package List
Red Hat JBoss Core Services on RHEL 6 Server:
Source:
jbcs-httpd24-apr-1.6.3-86.jbcs.el6.src.rpm
jbcs-httpd24-brotli-1.0.6-21.jbcs.el6.src.rpm
jbcs-httpd24-httpd-2.4.37-52.jbcs.el6.src.rpm
jbcs-httpd24-mod_cluster-native-1.3.12-41.Final_redhat_2.jbcs.el6.src.rpm
jbcs-httpd24-mod_http2-1.11.3-22.jbcs.el6.src.rpm
jbcs-httpd24-openssl-1.1.1c-16.jbcs.el6.src.rpm
i386:
jbcs-httpd24-apr-1.6.3-86.jbcs.el6.i686.rpm
jbcs-httpd24-apr-debuginfo-1.6.3-86.jbcs.el6.i686.rpm
jbcs-httpd24-apr-devel-1.6.3-86.jbcs.el6.i686.rpm
jbcs-httpd24-brotli-1.0.6-21.jbcs.el6.i686.rpm
jbcs-httpd24-brotli-debuginfo-1.0.6-21.jbcs.el6.i686.rpm
jbcs-httpd24-brotli-devel-1.0.6-21.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-2.4.37-52.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-debuginfo-2.4.37-52.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-devel-2.4.37-52.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-selinux-2.4.37-52.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-tools-2.4.37-52.jbcs.el6.i686.rpm
jbcs-httpd24-mod_cluster-native-1.3.12-41.Final_redhat_2.jbcs.el6.i686.rpm
jbcs-httpd24-mod_cluster-native-debuginfo-1.3.12-41.Final_redhat_2.jbcs.el6.i686.rpm
jbcs-httpd24-mod_http2-1.11.3-22.jbcs.el6.i686.rpm
jbcs-httpd24-mod_http2-debuginfo-1.11.3-22.jbcs.el6.i686.rpm
jbcs-httpd24-mod_ldap-2.4.37-52.jbcs.el6.i686.rpm
jbcs-httpd24-mod_proxy_html-2.4.37-52.jbcs.el6.i686.rpm
jbcs-httpd24-mod_session-2.4.37-52.jbcs.el6.i686.rpm
jbcs-httpd24-mod_ssl-2.4.37-52.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-1.1.1c-16.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-debuginfo-1.1.1c-16.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-devel-1.1.1c-16.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-libs-1.1.1c-16.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-perl-1.1.1c-16.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-static-1.1.1c-16.jbcs.el6.i686.rpm
noarch:
jbcs-httpd24-httpd-manual-2.4.37-52.jbcs.el6.noarch.rpm
ppc64:
jbcs-httpd24-brotli-1.0.6-21.jbcs.el6.ppc64.rpm
jbcs-httpd24-brotli-debuginfo-1.0.6-21.jbcs.el6.ppc64.rpm
jbcs-httpd24-brotli-devel-1.0.6-21.jbcs.el6.ppc64.rpm
jbcs-httpd24-mod_http2-1.11.3-22.jbcs.el6.ppc64.rpm
jbcs-httpd24-mod_http2-debuginfo-1.11.3-22.jbcs.el6.ppc64.rpm
x86_64:
jbcs-httpd24-apr-1.6.3-86.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-debuginfo-1.6.3-86.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-devel-1.6.3-86.jbcs.el6.x86_64.rpm
jbcs-httpd24-brotli-1.0.6-21.jbcs.el6.x86_64.rpm
jbcs-httpd24-brotli-debuginfo-1.0.6-21.jbcs.el6.x86_64.rpm
jbcs-httpd24-brotli-devel-1.0.6-21.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-2.4.37-52.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-debuginfo-2.4.37-52.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-devel-2.4.37-52.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-selinux-2.4.37-52.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-tools-2.4.37-52.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_cluster-native-1.3.12-41.Final_redhat_2.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_cluster-native-debuginfo-1.3.12-41.Final_redhat_2.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_http2-1.11.3-22.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_http2-debuginfo-1.11.3-22.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_ldap-2.4.37-52.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_proxy_html-2.4.37-52.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_session-2.4.37-52.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_ssl-2.4.37-52.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-1.1.1c-16.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-debuginfo-1.1.1c-16.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-devel-1.1.1c-16.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-libs-1.1.1c-16.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-perl-1.1.1c-16.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-static-1.1.1c-16.jbcs.el6.x86_64.rpm
Red Hat JBoss Core Services on RHEL 7 Server:
Source:
jbcs-httpd24-apr-1.6.3-86.jbcs.el7.src.rpm
jbcs-httpd24-brotli-1.0.6-21.jbcs.el7.src.rpm
jbcs-httpd24-httpd-2.4.37-52.jbcs.el7.src.rpm
jbcs-httpd24-mod_cluster-native-1.3.12-41.Final_redhat_2.jbcs.el7.src.rpm
jbcs-httpd24-mod_http2-1.11.3-22.jbcs.el7.src.rpm
jbcs-httpd24-openssl-1.1.1c-16.jbcs.el7.src.rpm
noarch:
jbcs-httpd24-httpd-manual-2.4.37-52.jbcs.el7.noarch.rpm
ppc64:
jbcs-httpd24-brotli-1.0.6-21.jbcs.el7.ppc64.rpm
jbcs-httpd24-brotli-debuginfo-1.0.6-21.jbcs.el7.ppc64.rpm
jbcs-httpd24-brotli-devel-1.0.6-21.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_http2-1.11.3-22.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_http2-debuginfo-1.11.3-22.jbcs.el7.ppc64.rpm
x86_64:
jbcs-httpd24-apr-1.6.3-86.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-debuginfo-1.6.3-86.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-devel-1.6.3-86.jbcs.el7.x86_64.rpm
jbcs-httpd24-brotli-1.0.6-21.jbcs.el7.x86_64.rpm
jbcs-httpd24-brotli-debuginfo-1.0.6-21.jbcs.el7.x86_64.rpm
jbcs-httpd24-brotli-devel-1.0.6-21.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-2.4.37-52.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-debuginfo-2.4.37-52.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-devel-2.4.37-52.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-selinux-2.4.37-52.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-tools-2.4.37-52.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_cluster-native-1.3.12-41.Final_redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_cluster-native-debuginfo-1.3.12-41.Final_redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_http2-1.11.3-22.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_http2-debuginfo-1.11.3-22.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_ldap-2.4.37-52.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_proxy_html-2.4.37-52.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_session-2.4.37-52.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_ssl-2.4.37-52.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-1.1.1c-16.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-debuginfo-1.1.1c-16.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-devel-1.1.1c-16.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-libs-1.1.1c-16.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-perl-1.1.1c-16.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-static-1.1.1c-16.jbcs.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
Updated packages that provide Red Hat JBoss Core Services Pack ApacheServer 2.4.37 and fix several bugs, and add various enhancements are nowavailable for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat JBoss Core Services on RHEL 6 Server - i386, noarch, ppc64, x86_64
Red Hat JBoss Core Services on RHEL 7 Server - noarch, ppc64, x86_64
Bugs Fixed
1743956 - CVE-2019-10092 httpd: limited cross-site scripting in mod_proxy error page
1743959 - CVE-2019-10098 httpd: mod_rewrite potential open redirect
1743966 - CVE-2019-10081 httpd: memory corruption on early pushes
1743974 - CVE-2019-10082 httpd: read-after-free in h2 connection shutdown
1743996 - CVE-2019-10097 httpd: null-pointer dereference in mod_remoteip
1752090 - CVE-2019-1547 openssl: side-channel weak encryption vulnerability
1752095 - CVE-2019-1549 openssl: information disclosure in fork()
1752100 - CVE-2019-1563 openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey