[Git][security-tracker-team/security-tracker][master] Reference fixes for apache2 issues
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jul 15 07:53:31 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d0b05cd0 by Salvatore Bonaccorso at 2025-07-15T08:52:54+02:00
Reference fixes for apache2 issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -808,6 +808,7 @@ CVE-2025-53364 (Parse Server is an open source backend that can be deployed to a
CVE-2025-53020 (Late Release of Memory after Effective Lifetime vulnerability in Apach ...)
- apache2 2.4.64-1
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2025-53020
+ NOTE: Fixed by: https://github.com/apache/httpd/commit/ef98f4f494ff2f99d736a3716cd31219688b46f5
CVE-2025-52837 (Trend Micro Password Manager (Consumer) version 5.8.0.1327 and below i ...)
NOT-FOR-US: Trend Micro
CVE-2025-52521 (Trend Micro Security 17.8 (Consumer) is vulnerable to a link following ...)
@@ -833,9 +834,11 @@ CVE-2025-4972 (An issue has been discovered in GitLab EE affecting all versions
CVE-2025-49812 (In some mod_ssl configurations on Apache HTTP Server versions through ...)
- apache2 2.4.64-1
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2025-49812
+ NOTE: Fixed by: https://github.com/apache/httpd/commit/87a7351c755c9ef8ab386e3090e44838c2a06d48
CVE-2025-49630 (In certain proxy configurations, a denial of service attack againstApa ...)
- apache2 2.4.64-1
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2025-49630
+ NOTE: Fixed by: https://github.com/apache/httpd/commit/88304321841a2fe8bd5eacc70e69418b0b545ca5
CVE-2025-49464 (Classic buffer overflow in certain Zoom Clients for Windows may allow ...)
NOT-FOR-US: Zoom
CVE-2025-49463 (Insufficient control flow management in certain Zoom Clients for iOS b ...)
@@ -891,21 +894,25 @@ CVE-2025-27889 (Wing FTP Server before 7.4.4 does not properly validate and sani
CVE-2025-23048 (In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to ...)
- apache2 2.4.64-1
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2025-23048
+ NOTE: Fixed by: https://github.com/apache/httpd/commit/c4cfa50c9068e8b8134c530ab21674e77d1278a2
CVE-2024-7650 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
NOT-FOR-US: OpenText
CVE-2024-47252 (Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP ...)
- apache2 2.4.64-1
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-47252
+ NOTE: Fixed by: https://github.com/apache/httpd/commit/c01e60707048be14a510f0a92128a5227923215c
CVE-2024-43394 (Server-Side Request Forgery (SSRF)in Apache HTTP Server on Windows all ...)
- apache2 <not-affected> (Windows specific)
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-43394
CVE-2024-43204 (SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to ...)
- apache2 2.4.64-1
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-43204
+ NOTE: Fixed by: https://github.com/apache/httpd/commit/b3d3ded288815bea063c3bf77dd80b26446f76ce
CVE-2024-42516 (HTTP response splitting in the core of Apache HTTP Server allows an at ...)
- apache2 2.4.64-1
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-42516
NOTE: CVE exists, because original patch for CVE-2023-38709 did not address the issue.
+ NOTE: Fixed by: https://github.com/apache/httpd/commit/a7a9d814c7c23e990283277230ddd5a9efec27c7
CVE-2024-39752 (IBM Analytics Content Hub 2.0, 2.1, 2.2, and 2.3 could be vulnerable t ...)
NOT-FOR-US: IBM
CVE-2024-38327 (IBM Analytics Content Hub 2.0, 2.1, 2.2, and 2.3 is vulnerable to info ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d0b05cd01eac30548f637409f8dc9655474d8860
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d0b05cd01eac30548f637409f8dc9655474d8860
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250715/833bc9fc/attachment.htm>
More information about the debian-security-tracker-commits
mailing list