Debian alert DLA-3919-1 (libapache-mod-jk)
From: | Chris Lamb <lamby@debian.org> | |
To: | debian-lts-announce@lists.debian.org | |
Subject: | [SECURITY] [DLA 3919-1] libapache-mod-jk security update | |
Date: | Mon, 14 Oct 2024 12:39:20 -0700 | |
Message-ID: | <172893257453.806508.12505188510489842504@copycat> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3919-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb October 14, 2024 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : libapache-mod-jk Version : 1:1.2.48-1+deb11u2 CVE ID : CVE-2024-46544 Debian Bug : 1082713 It was discovered that there was a configuration issue in libapache-mod-jk, an Apache web server module used to forward requests from Apache to Tomcat using the AJP protocol. An issue with incorrect default permissions could have allowed local users to view and modify shared memory containing mod_jk's configuration, which may have potentially led to information disclosure and/or a denial of service attack. For Debian 11 bullseye, this problem has been fixed in version 1:1.2.48-1+deb11u2. We recommend that you upgrade your libapache-mod-jk packages. For the detailed security status of libapache-mod-jk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libapache-mod-jk Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmcNatwACgkQHpU+J9Qx HlhBRw/9HExgimYdVGwiM9LsQYFhYuYZw9/CkFg9zXpE+5LWzngDhmTi57xcyQ+t AY1u65Be4zjrkXx7zwyJtZfU9mhaIifY6ViiRtVAc12cSAcS2W8EosJWnir/3PZt QXW+bvYIMATGnHgaHEiUCEF3r8W540ToQ/B0+HQSks+i2+r9ydrY2Sc2eF0tk4bL moznjaLGrJN50pcfrb7surqc9KEfWDyFuhyafF4+O8pNrTo67T2AkCGwHWnQCckB j6UZv7S5MKy2GBYwnXxo5kRCvDkwDHYrL1K6Aa/Q2L/bgsz959h8l7T/macgbZ96 FwXQfFwVe0neRZy2YxfsUT0O1NDPfY4rauKf58jH1/jDZcqeYtZpXwPPzIhuCfpS iyrL9K3hbxwMToiDytVEKz56g38Yq4w3/fgNmf1Ucpa5HC+elBTvzZaVM0l4x9+L 09jQQu41mVGUlCOR4wE6f4LhnrKP0sID4jcveUsMLtkXsbeNFP+J74unF+8KQ/rO zzFU+Hnz2wprjltoqZDdEEFPL2xCI/X+UZQutlGnzHK2Y9+JNHTilljKBch4w2uu hQh6ouJC+I662fDzvFD/AqIO/Mhf0koF5I3xu7yH4TPxrmUYwNgKDJdDVOT4+wWe iYHB7AmD/+yo+Tyo4OudoGp6Tk6HnX8OJTp+Pas0dUsT8x7mYR4= =9rrH -----END PGP SIGNATURE-----