Ausführen von Code mit höheren Privilegien in Apache
ID: | 201904-20 |
Distribution: | Gentoo |
Plattformen: | Keine Angabe |
Datum: | Di, 23. April 2019, 07:33 |
Referenzen: | https://nvd.nist.gov/vuln/detail/CVE-2019-0211 |
Applikationen: | Apache |
Originalnachricht |
|
--L6iaP+gRLNZHKoI4 Content-Type: text/plain; charset=utf-8 Content-Disposition: inlin Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201904-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Apache: Privilege escalation Date: April 22, 2019 Bugs: #682306 ID: 201904-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability in Apache might allow an attacker to escalate privileges. Background ========== The Apache HTTP server is one of the most popular web servers on the Internet. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-servers/apache < 2.4.39 >= 2.4.39 Description =========== A vulnerability was discovered in Apache with MPM event, worker, or prefork. Impact ====== An attacker could escalate privileges. Workaround ========== There is no known workaround at this time. Resolution ========== All Apache users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.39" References ========== [ 1 ] CVE-2019-0211 https://nvd.nist.gov/vuln/detail/CVE-2019-0211 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201904-20 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2019 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --L6iaP+gRLNZHKoI4 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAly+TiwACgkQpRQw84X1 dt0XLAgAld8wKnJFT84N+p/bnCYGBYsCYsCAxL2RXtcnKfCP/zIZyottfnNvrMu0 yo0KideoFd238IWgnOlCtFHvIoAPTskPB9as/fvoeeVGdGiCkfUb049u82PtAHt/ u/a73LibZXPqITFXWucSLD8pnozJqGs1fEUCM9HlDF0qLHfNPQgDv4G2QfTzJgSn Ddf2V//vjgWuAqIT2wsBeO7pqR8pk8zZL4ru8fmSy+LiuTTy/hBilN6A7+adRaA9 JKnJ4BCbj0jK1gCI9NCBuyq8UceQZ3BCteDPQyNvhvcxCm4BVDD9PEMfqF0VozeM REY4rppkq9xL/qNYkyKptMkrXJBDtA== =IOfX -----END PGP SIGNATURE----- --L6iaP+gRLNZHKoI4-- |