First published: Mon Jul 01 2024(Updated: )
Last updated 24 July 2024
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/apache2 | 2.4.62-1~deb11u1 2.4.61-1~deb11u1 2.4.62-1~deb12u1 2.4.62-1~deb12u2 2.4.62-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36387 has a severity rating that indicates it can lead to server crashes and performance degradation.
To fix CVE-2024-36387, update your Apache2 package to versions 2.4.62-1~deb11u1, 2.4.61-1~deb11u1, 2.4.62-1~deb12u1, 2.4.62-1~deb12u2, or 2.4.62-3.
CVE-2024-36387 is caused by serving WebSocket protocol upgrades over HTTP/2 connections, which can lead to a Null Pointer dereference.
CVE-2024-36387 affects users running specific versions of the Apache2 web server under Debian.
The potential impacts of CVE-2024-36387 include crashes of the server process and degraded performance.