-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2960-1                debian-...@lists.debian.org
https://www.debian.org/lts/security/               Emilio Pozuelo Monfort
March 22, 2022                                https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : apache2
Version        : 2.4.25-3+deb9u13
CVE ID         : CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23943

Several vulnerabilities have been discovered in the Apache HTTP server,
which could result in denial of service, request smuggling or buffer
overflows.

For Debian 9 stretch, these problems have been fixed in version
2.4.25-3+deb9u13.

We recommend that you upgrade your apache2 packages.

For the detailed security status of apache2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/apache2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=2YOy
-----END PGP SIGNATURE-----

Reply via email to