Pop-Up Thingie

>>> Magnum BBS <<<
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Usenet
  3. LINUX.GENTOO.ANNOUNCE
  • [gentoo-announce] [ GLSA 202208-20 ] Apache HTTPD: Multiple Vulnerabili

    From glsamaker@gentoo.org@21:1/5 to All on Sun Aug 14 02:20:01 2022
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202208-20
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: Apache HTTPD: Multiple Vulnerabilities
    Date: August 14, 2022
    Bugs: #813429, #816399, #816864, #829722, #835131, #850622
    ID: 202208-20

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been discovered in Apache Webserver, the
    worst of which could result in remote code execution.

    Background
    ==========

    The Apache HTTP server is one of the most popular web servers on the
    Internet.

    Affected packages
    =================

    -------------------------------------------------------------------
    Package / Vulnerable / Unaffected
    -------------------------------------------------------------------
    1 app-admin/apache-tools < 2.4.54 >= 2.4.54
    2 www-servers/apache < 2.4.54 >= 2.4.54

    Description
    ===========

    Multiple vulnerabilities have been discovered in Apache HTTPD. Please
    review the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Apache HTTPD users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.54"

    All Apache HTTPD tools users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-admin/apache-tools-2.4.54"

    References
    ==========

    [ 1 ] CVE-2021-33193
    https://nvd.nist.gov/vuln/detail/CVE-2021-33193
    [ 2 ] CVE-2021-34798
    https://nvd.nist.gov/vuln/detail/CVE-2021-34798
    [ 3 ] CVE-2021-36160
    https://nvd.nist.gov/vuln/detail/CVE-2021-36160
    [ 4 ] CVE-2021-39275
    https://nvd.nist.gov/vuln/detail/CVE-2021-39275
    [ 5 ] CVE-2021-40438
    https://nvd.nist.gov/vuln/detail/CVE-2021-40438
    [ 6 ] CVE-2021-41524
    https://nvd.nist.gov/vuln/detail/CVE-2021-41524
    [ 7 ] CVE-2021-41773
    https://nvd.nist.gov/vuln/detail/CVE-2021-41773
    [ 8 ] CVE-2021-42013
    https://nvd.nist.gov/vuln/detail/CVE-2021-42013
    [ 9 ] CVE-2021-44224
    https://nvd.nist.gov/vuln/detail/CVE-2021-44224
    [ 10 ] CVE-2021-44790
    https://nvd.nist.gov/vuln/detail/CVE-2021-44790
    [ 11 ] CVE-2022-22719
    https://nvd.nist.gov/vuln/detail/CVE-2022-22719
    [ 12 ] CVE-2022-22720
    https://nvd.nist.gov/vuln/detail/CVE-2022-22720
    [ 13 ] CVE-2022-22721
    https://nvd.nist.gov/vuln/detail/CVE-2022-22721
    [ 14 ] CVE-2022-23943
    https://nvd.nist.gov/vuln/detail/CVE-2022-23943
    [ 15 ] CVE-2022-26377
    https://nvd.nist.gov/vuln/detail/CVE-2022-26377
    [ 16 ] CVE-2022-28614
    https://nvd.nist.gov/vuln/detail/CVE-2022-28614
    [ 17 ] CVE-2022-28615
    https://nvd.nist.gov/vuln/detail/CVE-2022-28615
    [ 18 ] CVE-2022-29404
    https://nvd.nist.gov/vuln/detail/CVE-2022-29404
    [ 19 ] CVE-2022-30522
    https://nvd.nist.gov/vuln/detail/CVE-2022-30522
    [ 20 ] CVE-2022-30556
    https://nvd.nist.gov/vuln/detail/CVE-2022-30556
    [ 21 ] CVE-2022-31813
    https://nvd.nist.gov/vuln/detail/CVE-2022-31813

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202208-20

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2022 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmL4PUEACgkQFMQkOaVy +9kVog//RIcNjpBS++Zpgu60risNc73zQhEVa2w2U6ZWD/VW8zQuVwdn/L2JW94K WibRcyAzNZYW4lgteISMpmSmvAdSu5tP/aqUTWVKPfBGjz1qpiFMG7I2Lb5iClN+ 1QSkxVn0/AnUtAClcc6eQFYsIsQUmo9Q/mjVTybO6aPdp+iPYSfeUE0DghTe+5Us bv1MFkPf5ULHEG2Ve+77QECtDYVd6uTGvlW7wexh3yiUHGC13S/36WbfaC9nahg5 hvdW9xH55cywZEZjeJjdS+SXP4MxDwkiwrD9778S5OZn2omn/XTtxNDEldm/ZqIZ TNInzlendKW75ICQBLdJrmVNMIc+yhEiGO0pZDRunvhf9994JTlFBQGiy2V8LVUQ /a0uZE23cjNHpIg0PxfjkK7IEd2MMDaD4s98Q6hIw+mGu9ibBX+mlF4srypTCvlT DUTSxcEZocm2iSZHdZAjOCzU7RykbDJC9yguHZ008o6Gwm059i8+u2PPhaX+1fqf EVYbJ2DhEQ0OUGryG1i/vJq7ARGTPUKEF1RES0uZzdImplcbj4+x8rh6RUUpxXZE iR0DrN5KwKPDNjQIHuid3U7wtXSnXSidmML3v0MU70enu8BmtODBQFPto/F/98ho pp1trTa3sjmNA9uUH7hW2G+wZIP89T6fMqjDe2ehs7/vq07yP9g=
    =e/If
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • Who's Online

  • System Info

    Sysop: Keyop
    Location: Huddersfield, West Yorkshire, UK
    Users: 546
    Nodes: 16 (2 / 14)
    Uptime: 152:17:54
    Calls: 10,383
    Files: 14,054
    Messages: 6,417,816

© >>> Magnum BBS <<<, 2025