Mageia 2019-0407: apache security update
Summary
The updated packages fix security vulnerabilities:
Some HTTP/2 implementations are vulnerable to unconstrained interal data
buffering, potentially leading to a denial of service. The attacker opens
the HTTP/2 window so the peer can send without constraint; however, they
leave the TCP window closed so the peer cannot actually write (many of)
the bytes on the wire. The attacker then sends a stream of requests for
a large response object. Depending on how the servers queue the responses,
this can consume excess memory, CPU, or both. (CVE-2019-9517)
HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured
with "H2PushResource", could lead to an overwrite of memory in the pushing
request's pool, leading to crashes. The memory copied is that of the
configured push link header values, not data supplied by the client.
(CVE-2019-10081)
In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2
session handling could be made to read memory after being freed, d...
References
- https://bugs.mageia.org/show_bug.cgi?id=25316
- - https://httpd.apache.org/security/vulnerabilities_24.html
- https://www.debian.org/security/2019/dsa-4509
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
Resolution
MGASA-2019-0407 - Updated apache packages fix security vulnerabilities
SRPMS
- 7/core/apache-2.4.41-1.2.mga7