Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/apache2@2.4.65-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.65-1~deb12u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (7)
Vulnerability Summary Aliases
VCID-3ay7-bwah-2yd1 HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue. CVE-2024-42516
VCID-9tez-97xg-z3bs In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade. CVE-2025-49812
VCID-ha7f-21gy-3qa2 Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63. Users are recommended to upgrade to version 2.4.64, which fixes the issue. CVE-2025-53020
VCID-r471-g9xs-sbga In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host. CVE-2025-23048
VCID-ww49-y35r-ykdd SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue. CVE-2024-43204
VCID-zxet-n94k-57ge In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on". CVE-2025-49630
VCID-zyyh-n42k-8bhr Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files. CVE-2024-47252

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:48:02.684119+00:00 Debian Importer Fixing VCID-r471-g9xs-sbga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:47:43.932684+00:00 Debian Importer Fixing VCID-3ay7-bwah-2yd1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:38:48.890668+00:00 Debian Importer Fixing VCID-ww49-y35r-ykdd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:15.057122+00:00 Debian Importer Fixing VCID-zyyh-n42k-8bhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:56.954760+00:00 Debian Importer Fixing VCID-ha7f-21gy-3qa2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:01.673246+00:00 Debian Importer Fixing VCID-9tez-97xg-z3bs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:14.762484+00:00 Debian Importer Fixing VCID-zxet-n94k-57ge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:02:57.500862+00:00 Debian Importer Fixing VCID-r471-g9xs-sbga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:43.319520+00:00 Debian Importer Fixing VCID-3ay7-bwah-2yd1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:07.842629+00:00 Debian Importer Fixing VCID-ww49-y35r-ykdd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:20.308929+00:00 Debian Importer Fixing VCID-zyyh-n42k-8bhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:10.228629+00:00 Debian Importer Fixing VCID-ha7f-21gy-3qa2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:51.200471+00:00 Debian Importer Fixing VCID-9tez-97xg-z3bs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:56.006249+00:00 Debian Importer Fixing VCID-zxet-n94k-57ge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:12:46.649477+00:00 Debian Importer Fixing VCID-r471-g9xs-sbga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:46.347161+00:00 Debian Importer Fixing VCID-3ay7-bwah-2yd1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:16.950163+00:00 Debian Importer Fixing VCID-ww49-y35r-ykdd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:13.382663+00:00 Debian Importer Fixing VCID-zyyh-n42k-8bhr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:08.917642+00:00 Debian Importer Fixing VCID-ha7f-21gy-3qa2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:03.009164+00:00 Debian Importer Fixing VCID-9tez-97xg-z3bs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:08.111629+00:00 Debian Importer Fixing VCID-zxet-n94k-57ge https://security-tracker.debian.org/tracker/data/json 38.1.0