• rubin@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    58
    arrow-down
    4
    ·
    2 days ago

    This security researcher is just wrong. The version of apache running is likely in a ‘stable’ release where critical CVEs are fixed by back-porting patches to the same older version of software. Also, if I’m reading correctly, the vulnerability he cites is dependent on malicious behavior of apps hosted behind the vulnerable server. His would likely not meet this criteria, so the vulnerability does not affect his use case.

    It is the blogger, IMO, who is participating in ‘theater’. A little knowledge is a dangerous thing.

    • Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      5
      ·
      2 days ago

      Well the interesting thing here is that you took the time to type that out while he just blocked the person trying to report a security vulnerability.

    • BlueBockser@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      5
      ·
      2 days ago

      The example CVE linked in the article is plausible, though. The server was reportedly running 2.4.57 and the CVE was fixed in 2.4.60, so it’s definitely present in the software. Whether it would actually be exploitable is a different question.

      Overall, I don’t get your point about stable releases and backports. Yes, security patches are backported, but that results in a new release (2.4.60 in this case) which still has to be updated to. It’s not like you can just stay on 2.4.57 and magically still have the fix, that’s just not how software versioning is done.

      • corsicanguppy@lemmy.ca
        link
        fedilink
        English
        arrow-up
        8
        ·
        1 day ago

        The server was reportedly running 2.4.57 and the CVE was fixed in 2.4.60, so it’s definitely present in the software.

        Overall, I don’t get your point about stable releases and backports.

        Clearly. Hint: it’s what Enterprise Linux has done for 20 years.

      • Eager Eagle@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        1 day ago

        Distros may not update software versions when backporting some things, meaning they add a suffix they control to the version e.g. 2.4.57-ubuntu1.2 whatever, but the version reported by the software itself might still be 2.4.57.

        It depends on the release process. I was also confused once I was asking myself why the repo was reporting a CVE as fixed when it still showed the old version.