CVE-2019-0211
08.04.2019, 22:29
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.Enginsight
Vendor | Product | Version |
---|---|---|
apache | http_server | 2.4.17 ≤ 𝑥 ≤ 2.4.38 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 18.10 |
debian | debian_linux | 9.0 |
opensuse | leap | 15.0 |
opensuse | leap | 42.3 |
netapp | oncommand_unified_manager | - |
redhat | jboss_core_services | 1.0 |
redhat | openshift_container_platform | 3.11 |
redhat | openshift_container_platform_for_power | 3.11_ppc64le:_ppc64le |
redhat | software_collections | 1.0 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux_eus | 8.1 |
redhat | enterprise_linux_eus | 8.2 |
redhat | enterprise_linux_eus | 8.4 |
redhat | enterprise_linux_eus | 8.6 |
redhat | enterprise_linux_eus | 8.8 |
redhat | enterprise_linux_for_arm_64 | 8.0_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 8.1_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 8.2_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 8.4_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 8.6_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 8.8_aarch64:_aarch64 |
redhat | enterprise_linux_for_ibm_z_systems | 8.0_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 8.1_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 8.2_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 8.4_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 8.6_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 8.8_s390x:_s390x |
redhat | enterprise_linux_for_power_little_endian | 8.0_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 8.1_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 8.2_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 8.4_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 8.6_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 8.8_ppc64le:_ppc64le |
redhat | enterprise_linux_server_aus | 8.2 |
redhat | enterprise_linux_server_aus | 8.4 |
redhat | enterprise_linux_server_aus | 8.6 |
redhat | enterprise_linux_server_tus | 8.2 |
redhat | enterprise_linux_server_tus | 8.4 |
redhat | enterprise_linux_server_tus | 8.6 |
redhat | enterprise_linux_server_tus | 8.8 |
redhat | enterprise_linux_update_services_for_sap_solutions | 8.0 |
redhat | enterprise_linux_update_services_for_sap_solutions | 8.1 |
redhat | enterprise_linux_update_services_for_sap_solutions | 8.4 |
redhat | enterprise_linux_update_services_for_sap_solutions | 8.6 |
redhat | enterprise_linux_update_services_for_sap_solutions | 8.8 |
oracle | communications_session_report_manager | 8.0.0 |
oracle | communications_session_report_manager | 8.1.0 |
oracle | communications_session_report_manager | 8.1.1 |
oracle | communications_session_report_manager | 8.2.0 |
oracle | communications_session_route_manager | 8.0.0 |
oracle | communications_session_route_manager | 8.1.0 |
oracle | communications_session_route_manager | 8.1.1 |
oracle | communications_session_route_manager | 8.2.0 |
oracle | enterprise_manager_ops_center | 12.3.3 |
oracle | enterprise_manager_ops_center | 12.4.0 |
oracle | http_server | 12.2.1.3.0 |
oracle | instantis_enterprisetrack | 17.1 |
oracle | instantis_enterprisetrack | 17.2 |
oracle | instantis_enterprisetrack | 17.3 |
oracle | retail_xstore_point_of_service | 7.0 |
oracle | retail_xstore_point_of_service | 7.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References