Gentoo Linux Security Advisory 202409-31 - Multiple vulnerabilities have been found in Apache HTTPD, the worst of which could result in denial of service. Versions greater than or equal to 2.4.62 are affected.
e140c2ea34336c36470495b8e5becd4da0e3fc777733afa65462c3ef0f63a24c
Red Hat Security Advisory 2024-5240-03 - Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available. Issues addressed include null pointer and server-side request forgery vulnerabilities.
efec72663118bd1d8d902144e6ed58f6eaefbefc1d80c4af285ebd6651e54688
Red Hat Security Advisory 2024-5239-03 - Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available. Issues addressed include null pointer and server-side request forgery vulnerabilities.
7ab2c9ea380367af722c195675d66a4c72e703b02bb93d8f88cd963c492b3c59
Red Hat Security Advisory 2024-5001-03 - An update for httpd is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include a server-side request forgery vulnerability.
dfebdbe614fd279027296c7fca6fe7fc442ca244cb64eae8da5a2d61bbcd4b6c
Red Hat Security Advisory 2024-4726-03 - An update for httpd is now available for Red Hat Enterprise Linux 9. Issues addressed include null pointer and server-side request forgery vulnerabilities.
0bafedbeb1d51e5fbaefb365dba702f3f5e70152cf8fc3b54fb77955e88a0856
Red Hat Security Advisory 2024-4720-03 - An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8. Issues addressed include null pointer and server-side request forgery vulnerabilities.
318c308c4c770ac67a6c653141307c5b2640defe7b780c90f888ee693314f23a
Debian Linux Security Advisory 5729-1 - Multiple vulnerabilities have been discovered in the Apache HTTP server, which may result in authentication bypass, execution of scripts in directories not directly reachable by any URL, server-side request forgery or denial of service.
eb3189e905bc36ecd2fc5d02a5e9ced5c23c59fc1c76baa032f550292bf26979
Ubuntu Security Notice 6885-2 - USN-6885-1 fixed vulnerabilities in Apache HTTP Server. One of the security fixes introduced a regression when proxying requests to a HTTP/2 server. This update fixes the problem. Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code.
09a87e1b0ca03b35feb4d66d7489813a4fc3939cea0c49c3c31bf9e7662b2f1f
Ubuntu Security Notice 6885-1 - Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication.
dc636ce74692d3f1a7da32825e61e1fcdc0b5d5a5413a13dc147dac6ff15aae4