Search for packages
| purl | pkg:alpm/archlinux/apache@2.4.37-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-7u2r-egf2-vfhx
Aliases: CVE-2018-17189 |
By sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol. |
Affected by 6 other vulnerabilities. |
|
VCID-7vjg-vetg-p7f6
Aliases: CVE-2019-0190 |
A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts. |
Affected by 6 other vulnerabilities. |
|
VCID-ct26-19cq-8kd7
Aliases: CVE-2018-17199 |
In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded. |
Affected by 6 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:25:59.670104+00:00 | Arch Linux Importer | Affected by | VCID-7u2r-egf2-vfhx | https://security.archlinux.org/AVG-857 | 38.0.0 |
| 2026-04-01T18:25:59.645415+00:00 | Arch Linux Importer | Affected by | VCID-ct26-19cq-8kd7 | https://security.archlinux.org/AVG-857 | 38.0.0 |
| 2026-04-01T18:25:59.620881+00:00 | Arch Linux Importer | Affected by | VCID-7vjg-vetg-p7f6 | https://security.archlinux.org/AVG-857 | 38.0.0 |