Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:ebuild/www-servers/apache@2.4.54
purl pkg:ebuild/www-servers/apache@2.4.54
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (21)
Vulnerability Summary Aliases
VCID-4d3t-es7p-9qhn Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected. CVE-2022-28615
VCID-9u53-b79b-cfgd Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier. CVE-2021-34798
VCID-cqjv-6m9n-mfeq A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). CVE-2021-44224
VCID-d36c-rrxh-ybgv In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size. CVE-2022-29404
VCID-db6k-j9mj-e7hy A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48. CVE-2021-33193
VCID-ffpe-1ctd-77e9 A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. CVE-2021-41773
VCID-g55m-t4s1-nfhv Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions. CVE-2022-23943
VCID-gv84-vfvh-y7hu If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort. CVE-2022-30522
VCID-hj5r-jms3-x3fe While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project. CVE-2021-41524
VCID-hm3f-m22n-u3gy Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer. CVE-2022-30556
VCID-k4nk-qqxg-s7e6 Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling CVE-2022-22720
VCID-mtg7-8556-kbgd A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier. CVE-2021-40438
VCID-na94-5565-dyfc The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the "ap_rputs" function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue. CVE-2022-28614
VCID-p2a1-afnh-7qca Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application. CVE-2022-31813
VCID-pnc8-bb23-vqh1 A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier. CVE-2022-22719
VCID-qm7e-n9ay-hufy Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions. CVE-2022-26377
VCID-qn74-neyt-jkg9 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions. CVE-2021-42013
VCID-rdtq-8ng5-53fn A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). CVE-2021-36160
VCID-wrw6-uzz4-rkfb ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier. CVE-2021-39275
VCID-xfm9-e5nr-wyat If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier. CVE-2022-22721
VCID-xwnu-h1xh-3bg6 A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. CVE-2021-44790

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:03:08.174707+00:00 Gentoo Importer Fixing VCID-p2a1-afnh-7qca https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:08.157753+00:00 Gentoo Importer Fixing VCID-hm3f-m22n-u3gy https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:08.140194+00:00 Gentoo Importer Fixing VCID-gv84-vfvh-y7hu https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:08.120803+00:00 Gentoo Importer Fixing VCID-d36c-rrxh-ybgv https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:08.103527+00:00 Gentoo Importer Fixing VCID-4d3t-es7p-9qhn https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:08.085856+00:00 Gentoo Importer Fixing VCID-na94-5565-dyfc https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:08.066769+00:00 Gentoo Importer Fixing VCID-qm7e-n9ay-hufy https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:08.050087+00:00 Gentoo Importer Fixing VCID-g55m-t4s1-nfhv https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:08.032151+00:00 Gentoo Importer Fixing VCID-xfm9-e5nr-wyat https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:08.014190+00:00 Gentoo Importer Fixing VCID-k4nk-qqxg-s7e6 https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.995505+00:00 Gentoo Importer Fixing VCID-pnc8-bb23-vqh1 https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.978825+00:00 Gentoo Importer Fixing VCID-xwnu-h1xh-3bg6 https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.959073+00:00 Gentoo Importer Fixing VCID-cqjv-6m9n-mfeq https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.941957+00:00 Gentoo Importer Fixing VCID-qn74-neyt-jkg9 https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.924693+00:00 Gentoo Importer Fixing VCID-ffpe-1ctd-77e9 https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.905747+00:00 Gentoo Importer Fixing VCID-hj5r-jms3-x3fe https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.884282+00:00 Gentoo Importer Fixing VCID-mtg7-8556-kbgd https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.865681+00:00 Gentoo Importer Fixing VCID-wrw6-uzz4-rkfb https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.844198+00:00 Gentoo Importer Fixing VCID-rdtq-8ng5-53fn https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.826992+00:00 Gentoo Importer Fixing VCID-9u53-b79b-cfgd https://security.gentoo.org/glsa/202208-20 38.0.0
2026-04-01T13:03:07.808732+00:00 Gentoo Importer Fixing VCID-db6k-j9mj-e7hy https://security.gentoo.org/glsa/202208-20 38.0.0