First published: Mon Apr 29 2024(Updated: )
USN-6729-1 fixed vulnerabilities in Apache HTTP Server. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: Orange Tsai discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2023-38709) Keran Mu and Jianjun Chen discovered that the Apache HTTP Server incorrectly handled validating certain input. A remote attacker could possibly use this issue to perform HTTP request splitting attacks. (CVE-2024-24795) Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module incorrectly handled endless continuation frames. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2024-27316)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/apache2 | <2.4.58-1ubuntu8.1 | 2.4.58-1ubuntu8.1 |
Ubuntu | =24.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-6729-3 addresses multiple high-severity vulnerabilities in Apache HTTP Server that could be exploited by remote attackers.
To fix USN-6729-3, upgrade the Apache2 package to version 2.4.58-1ubuntu8.1 or later on Ubuntu 24.04 LTS.
USN-6729-3 addresses vulnerabilities CVE-2024-27316, CVE-2023-38709, and CVE-2024-24795 in Apache HTTP Server.
The vulnerabilities fixed in USN-6729-3 were discovered by researcher Orange Tsai.
USN-6729-3 is specifically relevant for the Apache HTTP Server version included in Ubuntu 24.04 LTS.