MGASA-2020-0327 - Updated apache packages fix security vulnerability

Publication date: 18 Aug 2020
URL: https://advisories.mageia.org/MGASA-2020-0327.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-9490,
     CVE-2020-11984,
     CVE-2020-11993

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the
'Cache-Digest' header in a HTTP/2 request would result in a crash when the
server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the
HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched
servers (CVE-2020-9490).

Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and
possible remote code execution (CVE-2020-11984).

Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for
the HTTP/2 module and on certain traffic edge patterns, logging statements were
made on the wrong connection, causing concurrent use of memory pools.
Configuring the LogLevel of mod_http2 above "info" will mitigate this
vulnerability for unpatched servers (CVE-2020-11993).

The apache package has been updated to version 2.4.46, fixing these issues and
other bugs.  See the upstream CHANGES file for details.

References:
- https://bugs.mageia.org/show_bug.cgi?id=27058
- https://httpd.apache.org/security/vulnerabilities_24.html#2.4.44
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993

SRPMS:
- 7/core/apache-2.4.46-1.mga7

Mageia 2020-0327: apache security update

Apache HTTP Server versions 2.4.20 to 2.4.43

Summary

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers (CVE-2020-9490).
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible remote code execution (CVE-2020-11984).
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers (CVE-2020-11993).
The apache package has been updated to version 2.4.46, fixing these issues and other bugs. See the upstream CHANGES file for details.

References

- https://bugs.mageia.org/show_bug.cgi?id=27058

- https://httpd.apache.org/security/vulnerabilities_24.html#2.4.44

- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993

Resolution

MGASA-2020-0327 - Updated apache packages fix security vulnerability

SRPMS

- 7/core/apache-2.4.46-1.mga7

Severity
Publication date: 18 Aug 2020
URL: https://advisories.mageia.org/MGASA-2020-0327.html
Type: security
CVE: CVE-2020-9490, CVE-2020-11984, CVE-2020-11993

Related News