{"id":"RLSA-2020:4751","summary":"Moderate: httpd:2.4 security, bug fix, and enhancement update","details":"The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nThe following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236)\n\nSecurity Fix(es):\n\n* httpd: memory corruption on early pushes (CVE-2019-10081)\n\n* httpd: read-after-free in h2 connection shutdown (CVE-2019-10082)\n\n* httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097)\n\n* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)\n\n* httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)\n\n* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)\n\n* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)\n\n* httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092)\n\n* httpd: mod_rewrite potential open redirect (CVE-2019-10098)\n\n* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.","modified":"2026-03-11T05:56:55.850776Z","published":"2020-11-03T12:33:02Z","upstream":["CVE-2018-17189","CVE-2019-0196","CVE-2019-0197","CVE-2019-10081","CVE-2019-10082","CVE-2019-10092","CVE-2019-10097","CVE-2019-10098","CVE-2020-1927","CVE-2020-1934"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2020:4751"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209162"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1668497"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695030"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695042"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743956"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743959"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743966"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743974"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743996"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1771847"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1814236"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820772"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1832844"}],"affected":[{"package":{"name":"mod_md","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/mod_md?distro=rocky-linux-8&epoch=1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.0.8-8.module+el8.5.0+695+1fa8055e"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:4751.json"}},{"package":{"name":"mod_md","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/mod_md?distro=rocky-linux-8-4-legacy&epoch=1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.0.8-8.module+el8.4.0+553+7a69454b"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2020:4751.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}