Search for packages
| purl | pkg:alpm/archlinux/apache@2.4.27-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-gw95-sjjz-p3ad
Aliases: CVE-2017-9798 |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-6ak5-ayqx-z3g2 | The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments. by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault. |
CVE-2017-9788
|
| VCID-mdjw-nh9k-muhu | When under stress, closing many connections, the HTTP/2 handling code would sometimes access memory after it has been freed, resulting in potentially erratic behaviour. |
CVE-2017-9789
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2025-07-31T11:37:16.521700+00:00 | Arch Linux Importer | Affected by | VCID-gw95-sjjz-p3ad | https://security.archlinux.org/AVG-404 | 37.0.0 |
| 2025-07-31T11:35:35.587561+00:00 | Arch Linux Importer | Fixing | VCID-6ak5-ayqx-z3g2 | https://security.archlinux.org/AVG-350 | 37.0.0 |
| 2025-07-31T11:35:35.559748+00:00 | Arch Linux Importer | Fixing | VCID-mdjw-nh9k-muhu | https://security.archlinux.org/AVG-350 | 37.0.0 |