MGASA-2017-0298

Source
https://advisories.mageia.org/MGASA-2017-0298.html
Import Source
https://advisories.mageia.org/MGASA-2017-0298.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0298
Related
Published
2017-08-24T07:52:24Z
Modified
2017-08-24T07:28:19Z
Summary
Updated apache packages fix security vulnerabilities
Details

In Apache httpd before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by modauthdigest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service (CVE-2017-9788).

When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behavior (CVE-2017-9789).

References
Credits

Affected packages

Mageia:6 / apache

Package

Name
apache
Purl
pkg:rpm/mageia/apache?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.27-1.mga6

Ecosystem specific

{
    "section": "core"
}