Search for packages
Package details: pkg:alpm/archlinux/apache@2.4.27-1
purl pkg:alpm/archlinux/apache@2.4.27-1
Next non-vulnerable version 2.4.27-2
Latest non-vulnerable version 2.4.55-1
Risk 10.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-2cgf-57ed-aaap
Aliases:
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
2.4.27-2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-h8ut-regn-aaam When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behaviour. CVE-2017-9789
VCID-kraa-vyt2-aaaa In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service. CVE-2017-9788

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:46:10.812755+00:00 Arch Linux Importer Affected by VCID-2cgf-57ed-aaap https://security.archlinux.org/AVG-404 36.0.0
2025-03-28T07:44:47.030171+00:00 Arch Linux Importer Fixing VCID-kraa-vyt2-aaaa https://security.archlinux.org/AVG-350 36.0.0
2025-03-28T07:44:46.999825+00:00 Arch Linux Importer Fixing VCID-h8ut-regn-aaam https://security.archlinux.org/AVG-350 36.0.0
2024-09-18T02:01:20.421936+00:00 Arch Linux Importer Affected by VCID-2cgf-57ed-aaap https://security.archlinux.org/AVG-404 34.0.1
2024-09-18T01:59:48.488974+00:00 Arch Linux Importer Fixing VCID-kraa-vyt2-aaaa https://security.archlinux.org/AVG-350 34.0.1
2024-09-18T01:59:48.467654+00:00 Arch Linux Importer Fixing VCID-h8ut-regn-aaam https://security.archlinux.org/AVG-350 34.0.1
2024-04-23T19:47:32.915105+00:00 Arch Linux Importer Affected by VCID-2cgf-57ed-aaap https://security.archlinux.org/AVG-404 34.0.0rc4
2024-04-23T19:47:31.419842+00:00 Arch Linux Importer Fixing VCID-kraa-vyt2-aaaa https://security.archlinux.org/AVG-350 34.0.0rc4
2024-04-23T19:47:31.396892+00:00 Arch Linux Importer Fixing VCID-h8ut-regn-aaam https://security.archlinux.org/AVG-350 34.0.0rc4
2024-01-03T22:27:31.071588+00:00 Arch Linux Importer Affected by VCID-2cgf-57ed-aaap https://security.archlinux.org/AVG-404 34.0.0rc1
2024-01-03T22:26:04.406652+00:00 Arch Linux Importer Fixing VCID-kraa-vyt2-aaaa https://security.archlinux.org/AVG-350 34.0.0rc1
2024-01-03T22:26:04.381275+00:00 Arch Linux Importer Fixing VCID-h8ut-regn-aaam https://security.archlinux.org/AVG-350 34.0.0rc1