In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
{
"versions": [
{
"introduced": "2.4.17"
},
{
"last_affected": "2.4.38"
},
{
"introduced": "0"
},
{
"last_affected": "1.0"
},
{
"introduced": "0"
},
{
"last_affected": "1.0"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "28"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "29"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "30"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11_ppc64le"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0_aarch64"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1_aarch64"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2_aarch64"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4_aarch64"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.6_aarch64"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.8_aarch64"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0_s390x"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1_s390x"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2_s390x"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4_s390x"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.6_s390x"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.8_s390x"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0_ppc64le"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1_ppc64le"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2_ppc64le"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4_ppc64le"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.6_ppc64le"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.8_ppc64le"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.1.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.3.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.4.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.2.1.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.1"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-0211.json"