--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-dce7e7738e
2021-09-20 13:55:08.442695
--------------------------------------------------------------------------------
Name : httpd
Product : Fedora 34
Version : 2.4.49
Release : 1.fc34
URL :
https://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.
--------------------------------------------------------------------------------
Update Information:
New httpd release 2.4.49
--------------------------------------------------------------------------------
ChangeLog:
* Thu Sep 16 2021 Lubo�� Uhliarik <luhliari(a)redhat.com> - 2.4.49-1
- new version 2.4.49 (#2004776)
* Tue Sep 14 2021 Sahana Prasad <sahana(a)redhat.com> - 2.4.48-8
- Rebuilt with OpenSSL 3.0.0
* Fri Aug 6 2021 Lubo�� Uhliarik <luhliari(a)redhat.com> - 2.4.48-7
- add symlink to system logo for noindex test page
* Fri Aug 6 2021 Joe Orton <jorton(a)redhat.com> - 2.4.48-4
- add OpenSSL 3.x compatibility patch
* Thu Jul 22 2021 Fedora Release Engineering <releng(a)fedoraproject.org> - 2.4.48-3
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Fri Jul 16 2021 Joe Orton <jorton(a)redhat.com> - 2.4.48-2
- mod_cgi/mod_cgid: update to unification from trunk
- httpd.conf: add note on care with Listen and starting at boot
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1968280 - CVE-2020-35452 httpd: Single zero byte stack overflow in
mod_auth_digest [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1968280
[ 2 ] Bug #1968308 - CVE-2021-26690 httpd: mod_session NULL pointer dereference in
parser [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1968308
[ 3 ] Bug #1969233 - CVE-2021-26691 httpd: Heap overflow in mod_session [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1969233
[ 4 ] Bug #1969234 - CVE-2020-13950 httpd: mod_proxy NULL pointer dereference
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1969234
[ 5 ] Bug #1969236 - CVE-2019-17567 httpd: mod_proxy_wstunnel tunneling of non Upgraded
connection [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1969236
[ 6 ] Bug #1969241 - CVE-2021-30641 httpd: MergeSlashes regression [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1969241
[ 7 ] Bug #2005118 - CVE-2021-40438 httpd: mod_proxy: SSRF via a crafted request
uri-path [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2005118
[ 8 ] Bug #2005120 - CVE-2021-39275 httpd: out-of-bounds write in ap_escape_quotes() via
malicious input [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2005120
[ 9 ] Bug #2005125 - CVE-2021-36160 httpd: mod_proxy_uwsgi: out-of-bounds read via a
crafted request uri-path [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2005125
[ 10 ] Bug #2005129 - CVE-2021-34798 httpd: NULL pointer dereference via malformed
requests [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2005129
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-dce7e7738e' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------