this post was submitted on 08 Sep 2025
49 points (73.3% liked)

Technology

74961 readers
3325 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

cross-posted from: https://programming.dev/post/37090037

Comments

you are viewing a single comment's thread
view the rest of the comments
[–] rubin@lemmy.sdf.org 53 points 1 day ago (2 children)

This security researcher is just wrong. The version of apache running is likely in a 'stable' release where critical CVEs are fixed by back-porting patches to the same older version of software. Also, if I'm reading correctly, the vulnerability he cites is dependent on malicious behavior of apps hosted behind the vulnerable server. His would likely not meet this criteria, so the vulnerability does not affect his use case.

It is the blogger, IMO, who is participating in 'theater'. A little knowledge is a dangerous thing.

[–] Ulrich@feddit.org 5 points 1 day ago

Well the interesting thing here is that you took the time to type that out while he just blocked the person trying to report a security vulnerability.

[–] BlueBockser@programming.dev -3 points 1 day ago (3 children)

The example CVE linked in the article is plausible, though. The server was reportedly running 2.4.57 and the CVE was fixed in 2.4.60, so it's definitely present in the software. Whether it would actually be exploitable is a different question.

Overall, I don't get your point about stable releases and backports. Yes, security patches are backported, but that results in a new release (2.4.60 in this case) which still has to be updated to. It's not like you can just stay on 2.4.57 and magically still have the fix, that's just not how software versioning is done.

[–] corsicanguppy@lemmy.ca 8 points 22 hours ago

The server was reportedly running 2.4.57 and the CVE was fixed in 2.4.60, so it’s definitely present in the software.

Overall, I don’t get your point about stable releases and backports.

Clearly. Hint: it's what Enterprise Linux has done for 20 years.

[–] eager_eagle@lemmy.world 6 points 23 hours ago* (last edited 23 hours ago)

Distros may not update software versions when backporting some things, meaning they add a suffix they control to the version e.g. 2.4.57-ubuntu1.2 whatever, but the version reported by the software itself might still be 2.4.57.

It depends on the release process. I was also confused once I was asking myself why the repo was reporting a CVE as fixed when it still showed the old version.