Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. DigitalOcean: Hey that Apache vuln thing needs upgrade on your droplet.

DigitalOcean: Hey that Apache vuln thing needs upgrade on your droplet.

Scheduled Pinned Locked Moved Uncategorized
cve202623918
12 Posts 7 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

    DigitalOcean: Hey that Apache vuln thing needs upgrade on your droplet.

    Me: Thanks! Are your distro repos updated to contain the patched version?

    DO: lol no

    [Edit: to be fair, this is Debian's fault, not DOs (see screenshot). At least DO told me!]

    [Edit 2: that specific vuln was quietly fixed on Debian specifically well before this version?? Would be advisable for them to have said that now?
    https://infosec.exchange/@tychotithonus/116527548611779862 ]

    #CVE_2026_23918

    Link Preview Image
    rootwyrm@weird.autosR This user is from outside of this forum
    rootwyrm@weird.autosR This user is from outside of this forum
    rootwyrm@weird.autos
    wrote last edited by
    #2

    @tychotithonus that's fine.

    They aren't gonna patch the hypervisors either.

    1 Reply Last reply
    0
    • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

      DigitalOcean: Hey that Apache vuln thing needs upgrade on your droplet.

      Me: Thanks! Are your distro repos updated to contain the patched version?

      DO: lol no

      [Edit: to be fair, this is Debian's fault, not DOs (see screenshot). At least DO told me!]

      [Edit 2: that specific vuln was quietly fixed on Debian specifically well before this version?? Would be advisable for them to have said that now?
      https://infosec.exchange/@tychotithonus/116527548611779862 ]

      #CVE_2026_23918

      Link Preview Image
      noplasticshower@infosec.exchangeN This user is from outside of this forum
      noplasticshower@infosec.exchangeN This user is from outside of this forum
      noplasticshower@infosec.exchange
      wrote last edited by
      #3

      @tychotithonus edge first? Lol

      1 Reply Last reply
      0
      • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

        DigitalOcean: Hey that Apache vuln thing needs upgrade on your droplet.

        Me: Thanks! Are your distro repos updated to contain the patched version?

        DO: lol no

        [Edit: to be fair, this is Debian's fault, not DOs (see screenshot). At least DO told me!]

        [Edit 2: that specific vuln was quietly fixed on Debian specifically well before this version?? Would be advisable for them to have said that now?
        https://infosec.exchange/@tychotithonus/116527548611779862 ]

        #CVE_2026_23918

        Link Preview Image
        andres4ny@social.ridetrans.itA This user is from outside of this forum
        andres4ny@social.ridetrans.itA This user is from outside of this forum
        andres4ny@social.ridetrans.it
        wrote last edited by
        #4

        @tychotithonus make sure you have (old)stable-proposed-updates enabled, it's going in that way rather than through stable-security.

        Link Preview Image
        Debian Package Tracker

        favicon

        (tracker.debian.org)

        andres4ny@social.ridetrans.itA 1 Reply Last reply
        0
        • andres4ny@social.ridetrans.itA andres4ny@social.ridetrans.it

          @tychotithonus make sure you have (old)stable-proposed-updates enabled, it's going in that way rather than through stable-security.

          Link Preview Image
          Debian Package Tracker

          favicon

          (tracker.debian.org)

          andres4ny@social.ridetrans.itA This user is from outside of this forum
          andres4ny@social.ridetrans.itA This user is from outside of this forum
          andres4ny@social.ridetrans.it
          wrote last edited by
          #5

          @tychotithonus (Wasn't my decision, but I'm guessing they're a bit twitchy about .67 since the last "bugfix" apache release had a pretty serious regression: https://tracker.debian.org/news/1725501/accepted-apache2-2466-1deb13u2-source-into-proposed-updates/ )

          tychotithonus@infosec.exchangeT 1 Reply Last reply
          0
          • andres4ny@social.ridetrans.itA andres4ny@social.ridetrans.it

            @tychotithonus (Wasn't my decision, but I'm guessing they're a bit twitchy about .67 since the last "bugfix" apache release had a pretty serious regression: https://tracker.debian.org/news/1725501/accepted-apache2-2466-1deb13u2-source-into-proposed-updates/ )

            tychotithonus@infosec.exchangeT This user is from outside of this forum
            tychotithonus@infosec.exchangeT This user is from outside of this forum
            tychotithonus@infosec.exchange
            wrote last edited by
            #6

            @Andres4NY Ah, thanks - I was just going to start asking!

            tychotithonus@infosec.exchangeT 1 Reply Last reply
            0
            • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

              DigitalOcean: Hey that Apache vuln thing needs upgrade on your droplet.

              Me: Thanks! Are your distro repos updated to contain the patched version?

              DO: lol no

              [Edit: to be fair, this is Debian's fault, not DOs (see screenshot). At least DO told me!]

              [Edit 2: that specific vuln was quietly fixed on Debian specifically well before this version?? Would be advisable for them to have said that now?
              https://infosec.exchange/@tychotithonus/116527548611779862 ]

              #CVE_2026_23918

              Link Preview Image
              eckes@zusammenkunft.netE This user is from outside of this forum
              eckes@zusammenkunft.netE This user is from outside of this forum
              eckes@zusammenkunft.net
              wrote last edited by
              #7

              @tychotithonus I just love the Debian security tracker, they manage the flood so good https://security-tracker.debian.org/tracker/CVE-2026-23918

              1 Reply Last reply
              0
              • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

                DigitalOcean: Hey that Apache vuln thing needs upgrade on your droplet.

                Me: Thanks! Are your distro repos updated to contain the patched version?

                DO: lol no

                [Edit: to be fair, this is Debian's fault, not DOs (see screenshot). At least DO told me!]

                [Edit 2: that specific vuln was quietly fixed on Debian specifically well before this version?? Would be advisable for them to have said that now?
                https://infosec.exchange/@tychotithonus/116527548611779862 ]

                #CVE_2026_23918

                Link Preview Image
                icing@chaos.socialI This user is from outside of this forum
                icing@chaos.socialI This user is from outside of this forum
                icing@chaos.social
                wrote last edited by
                #8

                @tychotithonus yeah, that thing.

                To my knowledge, the debian 2.4.66 packages already contain the fix. Which they could not link to the CVE as that was not available at the time.

                "Responsible disclosure" strikes again.

                1 Reply Last reply
                0
                • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

                  @Andres4NY Ah, thanks - I was just going to start asking!

                  tychotithonus@infosec.exchangeT This user is from outside of this forum
                  tychotithonus@infosec.exchangeT This user is from outside of this forum
                  tychotithonus@infosec.exchange
                  wrote last edited by
                  #9

                  @Andres4NY Parent post updated, apparently CVE-2026-23918 was fixed much earlier?

                  andres4ny@social.ridetrans.itA 1 Reply Last reply
                  0
                  • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

                    @Andres4NY Parent post updated, apparently CVE-2026-23918 was fixed much earlier?

                    andres4ny@social.ridetrans.itA This user is from outside of this forum
                    andres4ny@social.ridetrans.itA This user is from outside of this forum
                    andres4ny@social.ridetrans.it
                    wrote last edited by
                    #10

                    @tychotithonus either way:

                    "Unpacking apache2 (2.4.67-1~deb12u1) over (2.4.66-1~deb12u2) ..."

                    1 Reply Last reply
                    0
                    • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

                      DigitalOcean: Hey that Apache vuln thing needs upgrade on your droplet.

                      Me: Thanks! Are your distro repos updated to contain the patched version?

                      DO: lol no

                      [Edit: to be fair, this is Debian's fault, not DOs (see screenshot). At least DO told me!]

                      [Edit 2: that specific vuln was quietly fixed on Debian specifically well before this version?? Would be advisable for them to have said that now?
                      https://infosec.exchange/@tychotithonus/116527548611779862 ]

                      #CVE_2026_23918

                      Link Preview Image
                      gnomon@mastodon.socialG This user is from outside of this forum
                      gnomon@mastodon.socialG This user is from outside of this forum
                      gnomon@mastodon.social
                      wrote last edited by
                      #11

                      @tychotithonus do you happen to have a link to the info about Debian's .66 already having a fix for this issue?

                      tychotithonus@infosec.exchangeT 1 Reply Last reply
                      0
                      • gnomon@mastodon.socialG gnomon@mastodon.social

                        @tychotithonus do you happen to have a link to the info about Debian's .66 already having a fix for this issue?

                        tychotithonus@infosec.exchangeT This user is from outside of this forum
                        tychotithonus@infosec.exchangeT This user is from outside of this forum
                        tychotithonus@infosec.exchange
                        wrote last edited by
                        #12

                        @gnomon it's in the blog post. Eissing shows the timeline

                        1 Reply Last reply
                        1
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups