Search for packages
| purl | pkg:apk/alpine/apache2@2.4.39-r0?arch=s390x&distroversion=v3.21&reponame=main |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-4sss-a8ne-kqbc | When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. A server that never enabled the h2 protocol or that only enabled it for https: and did not configure the "H2Upgrade on" is unaffected by this. |
CVE-2019-0197
|
| VCID-6vxq-uxxw-ybeh | Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparision when determining the method of a request and thus process the request incorrectly. |
CVE-2019-0196
|
| VCID-ehv1-yvpu-ubcg | In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected. |
CVE-2019-0211
|
| VCID-ugdv-apr8-g3bz | In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. |
CVE-2019-0215
|
| VCID-uwqg-yytc-vfae | When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them. |
CVE-2019-0220
|
| VCID-w6p6-u8ku-k3f6 | In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions. |
CVE-2019-0217
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-06T04:54:09.117624+00:00 | Alpine Linux Importer | Fixing | VCID-4sss-a8ne-kqbc | https://secdb.alpinelinux.org/v3.21/main.json | 38.1.0 |
| 2026-04-03T17:51:20.983851+00:00 | Alpine Linux Importer | Fixing | VCID-ugdv-apr8-g3bz | https://secdb.alpinelinux.org/v3.21/main.json | 38.1.0 |
| 2026-04-01T19:15:23.223502+00:00 | Alpine Linux Importer | Fixing | VCID-ehv1-yvpu-ubcg | https://secdb.alpinelinux.org/v3.21/main.json | 38.0.0 |
| 2026-04-01T19:14:55.858723+00:00 | Alpine Linux Importer | Fixing | VCID-6vxq-uxxw-ybeh | https://secdb.alpinelinux.org/v3.21/main.json | 38.0.0 |
| 2026-04-01T19:04:28.927524+00:00 | Alpine Linux Importer | Fixing | VCID-uwqg-yytc-vfae | https://secdb.alpinelinux.org/v3.21/main.json | 38.0.0 |
| 2026-04-01T18:59:18.612766+00:00 | Alpine Linux Importer | Fixing | VCID-w6p6-u8ku-k3f6 | https://secdb.alpinelinux.org/v3.21/main.json | 38.0.0 |