MGASA-2020-0327

Source
https://advisories.mageia.org/MGASA-2020-0327.html
Import Source
https://advisories.mageia.org/MGASA-2020-0327.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0327
Related
Published
2020-08-18T17:41:27Z
Modified
2020-08-18T16:51:25Z
Summary
Updated apache packages fix security vulnerability
Details

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers (CVE-2020-9490).

Apache HTTP server 2.4.32 to 2.4.44 modproxyuwsgi info disclosure and possible remote code execution (CVE-2020-11984).

Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers (CVE-2020-11993).

The apache package has been updated to version 2.4.46, fixing these issues and other bugs. See the upstream CHANGES file for details.

References
Credits

Affected packages

Mageia:7 / apache

Package

Name
apache
Purl
pkg:rpm/mageia/apache?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.46-1.mga7

Ecosystem specific

{
    "section": "core"
}