- Issued:
- 2016-12-15
- Updated:
- 2016-12-15
RHSA-2016:2957 - Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release
Synopsis
Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release
Type/Severity
Security Advisory Important
Topic
Red Hat JBoss Core Services httpd 2.4.23 is now available from the Red Hat Customer Portal for Solaris and Microsoft Windows systems.
Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
This release of Red Hat JBoss Core Services httpd 2.4.23 serves as a replacement for JBoss Core Services Apache HTTP Server 2.4.6.
Security Fix(es):
-
This update fixes several flaws in OpenSSL. (CVE-2014-8176, CVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2177, CVE-2016-2178, CVE-2016-2842)
-
This update fixes several flaws in libxml2. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)
-
This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420, CVE-2016-7141)
-
This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)
-
This update fixes two flaws in mod_cluster. (CVE-2016-4459, CVE-2016-8612)
-
A buffer overflow flaw when concatenating virtual host names and URIs was fixed in mod_jk. (CVE-2016-6808)
-
A memory leak flaw was fixed in expat. (CVE-2012-1148)
Red Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-0286, CVE-2016-2108, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Stephen Henson (OpenSSL development team) as the original reporter of CVE-2015-0286; Huzaifa Sidhpurwala (Red Hat), Hanno Böck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2105, CVE-2016-2106, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842; Juraj Somorovsky as the original reporter of CVE-2016-2107; Yuval Yarom (University of Adelaide and NICTA), Daniel Genkin (Technion and Tel Aviv University), and Nadia Heninger (University of Pennsylvania) as the original reporters of CVE-2016-0702; and Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705.
See the corresponding CVE pages linked to in the References section for more information about each of the flaws listed in this advisory.
Solution
The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).
After installing the updated packages, the httpd daemon will be restarted automatically.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat JBoss Core Services | Text-Only Advisories | x86_64 |
Fixes
- This content is not included.BZ - 801648
- This content is not included.BZ - 1121519
- This content is not included.BZ - 1196737
- This content is not included.BZ - 1202366
- This content is not included.BZ - 1227574
- This content is not included.BZ - 1228611
- This content is not included.BZ - 1243888
- This content is not included.BZ - 1288320
- This content is not included.BZ - 1288322
- This content is not included.BZ - 1288326
- This content is not included.BZ - 1310596
- This content is not included.BZ - 1310599
- This content is not included.BZ - 1311880
- This content is not included.BZ - 1312219
- This content is not included.BZ - 1314757
- This content is not included.BZ - 1319829
- This content is not included.BZ - 1330101
- This content is not included.BZ - 1331402
- This content is not included.BZ - 1331426
- This content is not included.BZ - 1331441
- This content is not included.BZ - 1331536
- This content is not included.BZ - 1332443
- This content is not included.BZ - 1332820
- This content is not included.BZ - 1338682
- This content is not included.BZ - 1338686
- This content is not included.BZ - 1338691
- This content is not included.BZ - 1338696
- This content is not included.BZ - 1338700
- This content is not included.BZ - 1338701
- This content is not included.BZ - 1338702
- This content is not included.BZ - 1338703
- This content is not included.BZ - 1338705
- This content is not included.BZ - 1338706
- This content is not included.BZ - 1338708
- This content is not included.BZ - 1338711
- This content is not included.BZ - 1341583
- This content is not included.BZ - 1341705
- This content is not included.BZ - 1343400
- This content is not included.BZ - 1362183
- This content is not included.BZ - 1362190
- This content is not included.BZ - 1373229
- This content is not included.BZ - 1382352
- This content is not included.BZ - 1387605
CVEs
- CVE-2012-0876
- CVE-2012-1148
- CVE-2014-3523
- CVE-2014-8176
- CVE-2015-0209
- CVE-2015-0286
- CVE-2015-3185
- CVE-2015-3194
- CVE-2015-3195
- CVE-2015-3196
- CVE-2015-3216
- CVE-2016-0702
- CVE-2016-0705
- CVE-2016-0797
- CVE-2016-0799
- CVE-2016-1762
- CVE-2016-1833
- CVE-2016-1834
- CVE-2016-1835
- CVE-2016-1836
- CVE-2016-1837
- CVE-2016-1838
- CVE-2016-1839
- CVE-2016-1840
- CVE-2016-2105
- CVE-2016-2106
- CVE-2016-2107
- CVE-2016-2108
- CVE-2016-2109
- CVE-2016-2177
- CVE-2016-2178
- CVE-2016-2842
- CVE-2016-3627
- CVE-2016-3705
- CVE-2016-4447
- CVE-2016-4448
- CVE-2016-4449
- CVE-2016-4459
- CVE-2016-4483
- CVE-2016-5419
- CVE-2016-5420
- CVE-2016-6808
- CVE-2016-7141
- CVE-2016-8612
References
- https://access.redhat.com/security/updates/classification/#important
- This content is not included.This content is not included.https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=distributions&version=2.4.23
- This content is not included.This content is not included.https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.