Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Apache HTTP Server Malicious Configuration File Overwrite
MINI-64h2-q2x3-g776
Summary
A configuration file in the Apache HTTP Server can be overwritten by an attacker, potentially allowing them to gain unauthorized access to the server. This is a concern for businesses that rely on Apache to host their websites or services. IT teams should review their Apache configurations to ensure they are up to date and secure.
What to do
- Update linkerd2-fips to version 26.4.1-r0.
- Update linkerd2-web-fips to version 26.4.1-r0.
- Update linkerd2-cli-fips to version 26.4.1-r0.
- Update linkerd2-proxy-identity-fips to version 26.4.1-r0.
- Update linkerd2-controller-fips to version 26.4.1-r0.
- Update linkerd2-metrics-api-fips to version 26.4.1-r0.
- Update linkerd2-tap-fips to version 26.4.1-r0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | linkerd2-fips | <= 26.4.1-r0 | 26.4.1-r0 |
| – | linkerd2-web-fips | <= 26.4.1-r0 | 26.4.1-r0 |
| – | linkerd2-cli-fips | <= 26.4.1-r0 | 26.4.1-r0 |
| – | linkerd2-proxy-identity-fips | <= 26.4.1-r0 | 26.4.1-r0 |
| – | linkerd2-controller-fips | <= 26.4.1-r0 | 26.4.1-r0 |
| – | linkerd2-metrics-api-fips | <= 26.4.1-r0 | 26.4.1-r0 |
| – | linkerd2-tap-fips | <= 26.4.1-r0 | 26.4.1-r0 |
Original title
MINI-64h2-q2x3-g776
Published: 3 Apr 2026 · Updated: 3 Apr 2026 · First seen: 3 Apr 2026