{"id":"MGASA-2019-0109","summary":"Updated apache packages fix security vulnerability","details":"By sending request bodies in a slow loris way to plain resources, the h2\nstream for that request unnecessarily occupied a server thread cleaning up\nthat incoming data. This affects only HTTP/2 (mod_http2) connections in\nApache HTTP Server versions 2.4.37 and prior (CVE-2018-17189).\n\nIn Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the\nsession expiry time before decoding the session. This causes session\nexpiry time to be ignored for mod_session_cookie sessions since the expiry\ntime is loaded when the session is decoded (CVE-2018-17199).\n\nThe apache package has been updated to version 2.4.38, fixing these issues\nand several other bugs.  See the upstream CHANGES files for details.\n","modified":"2026-04-16T04:42:45.959742893Z","published":"2019-03-14T21:39:55Z","upstream":["CVE-2018-17189","CVE-2018-17199"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2019-0109.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=24226"},{"type":"WEB","url":"http://www.apache.org/dist/httpd/CHANGES_2.4.38"},{"type":"WEB","url":"https://httpd.apache.org/security/vulnerabilities_24.html"}],"affected":[{"package":{"name":"apache","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/apache?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.38-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0109.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}