Search for packages
| purl | pkg:alpm/archlinux/apache@2.4.26-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-14p1-29y6-cbh5 | A maliciously constructed HTTP/2 request could cause mod_http2 to dereference a NULL pointer and crash the server process. |
CVE-2017-7659
|
| VCID-5n84-u3mu-nqcg | Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. Third-party module writers SHOULD use ap_get_basic_auth_components(), available in 2.2.34 and 2.4.26, instead of ap_get_basic_auth_pw(). Modules which call the legacy ap_get_basic_auth_pw() during the authentication phase MUST either immediately authenticate the user after the call, or else stop the request immediately with an error response, to avoid incorrectly authenticating the current request. |
CVE-2017-3167
|
| VCID-dvvr-yvra-dqfq | mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port. |
CVE-2017-3169
|
| VCID-ea9w-665t-67cx |
CVE-2017-7679
|
|
| VCID-yk57-n7zf-hbah | The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. |
CVE-2017-7668
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2025-07-31T11:37:18.775067+00:00 | Arch Linux Importer | Fixing | VCID-5n84-u3mu-nqcg | https://security.archlinux.org/AVG-316 | 37.0.0 |
| 2025-07-31T11:37:18.748571+00:00 | Arch Linux Importer | Fixing | VCID-dvvr-yvra-dqfq | https://security.archlinux.org/AVG-316 | 37.0.0 |
| 2025-07-31T11:37:18.719830+00:00 | Arch Linux Importer | Fixing | VCID-14p1-29y6-cbh5 | https://security.archlinux.org/AVG-316 | 37.0.0 |
| 2025-07-31T11:37:18.693005+00:00 | Arch Linux Importer | Fixing | VCID-yk57-n7zf-hbah | https://security.archlinux.org/AVG-316 | 37.0.0 |
| 2025-07-31T11:37:18.666479+00:00 | Arch Linux Importer | Fixing | VCID-ea9w-665t-67cx | https://security.archlinux.org/AVG-316 | 37.0.0 |