-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2960-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort March 22, 2022 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : apache2 Version : 2.4.25-3+deb9u13 CVE ID : CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943 Several vulnerabilities have been discovered in the Apache HTTP server, which could result in denial of service, request smuggling or buffer overflows. For Debian 9 stretch, these problems have been fixed in version 2.4.25-3+deb9u13. We recommend that you upgrade your apache2 packages. For the detailed security status of apache2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/apache2 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAmI5e5IACgkQnUbEiOQ2 gwKNVw//Y6cvKiaxXZu3lMpGQsUdQN3BGgC+EU3ozLhKkUkjwHlusv3VtHvS5UBF 7qvPMgsvqTlm6iZldCxfJ7VUZeL66r5Kdnhw87WN6EmMi9z0mPSg8zakwL5EoJFa 2L6K6VoApYaVRlkSJ6kgG/kt4PSTUyd30z5874ftAr9y1ZFqFb1t2GrCQ5SzCl69 u355QaWvoywnzeSJnM1uSOitJ58SH89Tb8eLyPaMUxPA8czAR3dMgLCMzoIdKQ/T zrgfq8hpwxEA68R6BPGWULOdrABxiW9Ajzwr+zFSDHu7AMlww8Eb7DK7ewFg8mGo Q+dDletEWe5aC1BO/+JRCG//JaDqxmCWuqRiuS6ePtW/mniNmSIg3yPgnfrTx2wK Zjyky8DQmkijjC65QSE5wOsVQBWlmRqznBidkBy8o76M0+MdvtItXMIbTei853Fr q85vUou6+7yoP9fpvyvQE+f6s0VXYMbMfbNNqn74Imr8df6K3O9ASYlgmBPqcXZH U7gppLf5+ikcLbveKwv6vRfKAVGOQMiYDBWVepjjkkAHjcVmwBNWxy4DhoG9ETVs vwFFdR/51+ZIdtudSgHRflDh4wN41tZ9KZoojsvVH9YWwe1laP3qpfrVrjiiS6G6 fRpMuTg3y8+G2QvlJKKUNi2emDYoT7TUHJYWXBos/7pVmrn3yfg= =2YOy -----END PGP SIGNATURE-----