A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.4.29-1ubuntu4.17",
"binary_name": "apache2"
},
{
"binary_version": "2.4.29-1ubuntu4.17",
"binary_name": "apache2-bin"
},
{
"binary_version": "2.4.29-1ubuntu4.17",
"binary_name": "apache2-data"
},
{
"binary_version": "2.4.29-1ubuntu4.17",
"binary_name": "apache2-dev"
},
{
"binary_version": "2.4.29-1ubuntu4.17",
"binary_name": "apache2-ssl-dev"
},
{
"binary_version": "2.4.29-1ubuntu4.17",
"binary_name": "apache2-suexec-custom"
},
{
"binary_version": "2.4.29-1ubuntu4.17",
"binary_name": "apache2-suexec-pristine"
},
{
"binary_version": "2.4.29-1ubuntu4.17",
"binary_name": "apache2-utils"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "apache2"
},
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "apache2-bin"
},
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "apache2-data"
},
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "apache2-dev"
},
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "apache2-ssl-dev"
},
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "apache2-suexec-custom"
},
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "apache2-suexec-pristine"
},
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "apache2-utils"
},
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "libapache2-mod-md"
},
{
"binary_version": "2.4.41-4ubuntu3.5",
"binary_name": "libapache2-mod-proxy-uwsgi"
}
]
}