You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, Debian/Ubuntu does not look at repositories of installed packages.
fixed version: 2.4.41-4ubuntu3.14 < installed version: 2.4.55-1+ubuntu20.04.1+deb.sury.org+2, so this should be treated as a unaffected vulnerability on your machine.
I think 2.4.56 is the version of apache/httpd.
Please note that the versions of apache/httpd and the apache package provided by ubuntu do not always match.
However, since you are not using apache in the official repository provided by Ubuntu to begin with, there is no point in looking at ubuntu's fixed version.
You should check what version of apache you are using, what version of apache/httpd you derived it from, and what patches you have applied so far.
Hi,
For "reasons" we use the apache of "deb http://ppa.launchpad.net/ondrej/apache2/ubuntu focal main"
instead of the normal ubuntu one.
I was wondering if vuls also detects CVE's on those packages.
ii apache2 2.4.55-1+ubuntu20.04.1+deb.sury.org+2 amd64 Apache HTTP Server
should match cve https://ubuntu.com/security/CVE-2023-25690 but it doesn't?
The text was updated successfully, but these errors were encountered: