[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2017:3018-01 -- Redhat httpd24, httpd24-httpd, httpd24-curl, httpd24-mod_auth_kerb, httpd24-nghttp2

ID: oval:org.secpod.oval:def:504850Date: (C)2021-02-03   (M)2024-02-19
Class: PATCHFamily: unix




The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module. The following packages have been upgraded to a later upstream version: httpd24-httpd . Security Fix: * A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. Red Hat would like to thank Hanno Bock for reporting this issue. Bug Fix: * The httpd package installation script tried to create both the apache user and group in a single useradd command. Consequently, when the apache group had already been created on the system, the command failed, and the apache user was not created. To fix this bug, the apache group is now created by a separate command, and the apache user is correctly created during httpd installation even when the apache group exists. * When installing the httpd24 Software Collection using the yum command, if the apache group already existed on the system with GID other than 48, the apache user was not created. This update fixes the bug. * With this update, it is possible to run the mod_rewrite external mapping program as a non-root user. * On a Red Hat Enterprise Linux 6 system, when the httpd service was stopped twice in a row by running the service httpd stop command, a misleading message was returned: Stopping httpd: [FAILED] . This bug has been fixed. * When the service httpd24-httpd graceful command was used on Red Hat Enterprise Linux 7 while the httpd24-httpd service was not running, the daemon was started without being tracked by systemd. As a consequence, the daemon ran in an incorrect SELinux domain. This bug has been fixed, and the httpd daemon runs in the correct SELinux domain in the described scenario. Enhancement: * With this update, the mod_ssl module supports the ALPN protocol on Red Hat Enterprise Linux 7.4 and later versions. For further details, see the Red Hat Software Collections 3.0 Release Notes linked from the References section.

Platform:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 6
Product:
httpd24
httpd24-httpd
httpd24-curl
httpd24-mod_auth_kerb
httpd24-nghttp2
Reference:
RHSA-2017:3018-01
CVE-2017-9798
CVE    1
CVE-2017-9798
CPE    7
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6
cpe:/a:apache:httpd24-nghttp2
cpe:/a:apache:httpd24
...

© SecPod Technologies