{"id":"ALSA-2020:4751","summary":"Moderate: httpd:2.4 security, bug fix, and enhancement update","details":"The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nThe following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)\n\nSecurity Fix(es):\n\n* httpd: memory corruption on early pushes (CVE-2019-10081)\n\n* httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)\n\n* httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)\n\n* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)\n\n* httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)\n\n* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)\n\n* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)\n\n* httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)\n\n* httpd: mod_rewrite potential open redirect (CVE-2019-10098)\n\n* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-01-30T01:46:09.127988Z","published":"2020-11-03T12:33:02Z","related":["CVE-2018-17189","CVE-2019-0196","CVE-2019-0197","CVE-2019-10081","CVE-2019-10082","CVE-2019-10092","CVE-2019-10097","CVE-2019-10098","CVE-2020-1927","CVE-2020-1934"],"references":[{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2020-4751.html"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2018-17189"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-0196"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-0197"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-10081"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-10082"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-10092"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-10097"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2019-10098"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2020-1927"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2020-1934"}],"affected":[{"package":{"name":"mod_md","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mod_md"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.0.8-8.module_el8.5.0+2609+b30d9eec"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2020:4751.json"}},{"package":{"name":"mod_md","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/mod_md"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2020:4751.json"}}],"schema_version":"1.7.3"}