You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa Apache

Sigurnosni nedostatak programskog paketa Apache

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LGE

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201904-20
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: Apache: Privilege escalation
Date: April 22, 2019
Bugs: #682306
ID: 201904-20

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

A vulnerability in Apache might allow an attacker to escalate
privileges.

Background
==========

The Apache HTTP server is one of the most popular web servers on the
Internet.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 www-servers/apache < 2.4.39 >= 2.4.39

Description
===========

A vulnerability was discovered in Apache with MPM event, worker, or
prefork.

Impact
======

An attacker could escalate privileges.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Apache users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=www-servers/apache-2.4.39”

References
==========

[ 1 ] CVE-2019-0211
https://nvd.nist.gov/vuln/detail/CVE-2019-0211

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-20

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5
—–BEGIN PGP SIGNATURE—–

iQEzBAABCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAly+TiwACgkQpRQw84X1
dt0XLAgAld8wKnJFT84N+p/bnCYGBYsCYsCAxL2RXtcnKfCP/zIZyottfnNvrMu0
yo0KideoFd238IWgnOlCtFHvIoAPTskPB9as/fvoeeVGdGiCkfUb049u82PtAHt/
u/a73LibZXPqITFXWucSLD8pnozJqGs1fEUCM9HlDF0qLHfNPQgDv4G2QfTzJgSn
Ddf2V//vjgWuAqIT2wsBeO7pqR8pk8zZL4ru8fmSy+LiuTTy/hBilN6A7+adRaA9
JKnJ4BCbj0jK1gCI9NCBuyq8UceQZ3BCteDPQyNvhvcxCm4BVDD9PEMfqF0VozeM
REY4rppkq9xL/qNYkyKptMkrXJBDtA==
=IOfX
—–END PGP SIGNATURE—–

AutorJosip Papratovic
Cert idNCERT-REF-2019-04-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa java-1.7.0-openjdk

Otkriveni su sigurnosni nedostaci u programskom paketu java-1.7.0-openjdk za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja...

Close