it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5662-1] apache2 security update
- Date: Tue, 16 Apr 2024 18:31:41 +0000
- List-archive: https://lists.debian.org/msgid-search/Zh7EDT9k6Jr49n2G AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=f8WDiQB6WNobIx+Ah7PVw7rMuAZIiRzPCCVKNT0EQ2o=; b=Gi PMKP4Ax1UKEPnH3rZl/0d2cg5bXHU4OXBg2pfYLz7eveBqTENYc1pGdskY9WGNl0ozh1ZO5/FdC5R yyTGpI770MA4yJZVpxP3BS7JClEvPb3Z46/wsdjfqsHyZzB8M2z8hV6cSWOba/6GFmaBTVgxWlAQU gYrvYi5XL2SkXcmE5FvKWtB4rzc/n2cCHtPsCBnzJv4rFjpBhJkjzB/foN0GVMmpA9IA7/pG5tHK4 PziJHq88mOFIh+FhIHdqAMn4XTburigtPcbLt9uplxs4XTQBO+iB3HywAgP18fyk1enC4pov/3L+2 kcVEUKiashTh8p535eX6pAtUEvw4+MoQ==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Tue, 16 Apr 2024 18:32:08 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <Lk2BN-uCmPP.A.-ED.nQsHmB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5662-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 16, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : apache2
CVE ID : CVE-2023-31122 CVE-2023-38709 CVE-2023-43622
CVE-2023-45802 CVE-2024-24795 CVE-2024-27316
Multiple vulnerabilities have been discovered in the Apache HTTP server,
which may result in HTTP response splitting or denial of service.
For the oldstable distribution (bullseye), these problems have been fixed
in version 2.4.59-1~deb11u1.
For the stable distribution (bookworm), these problems have been fixed in
version 2.4.59-1~deb12u1.
We recommend that you upgrade your apache2 packages.
For the detailed security status of apache2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/apache2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=GLD7
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5662-1] apache2 security update, Moritz Muehlenhoff, 16.04.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.