-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-dce7e7738e 2021-09-20 13:55:08.442695 --------------------------------------------------------------------------------
Name : httpd Product : Fedora 34 Version : 2.4.49 Release : 1.fc34 URL : https://httpd.apache.org/ Summary : Apache HTTP Server Description : The Apache HTTP Server is a powerful, efficient, and extensible web server.
-------------------------------------------------------------------------------- Update Information:
New httpd release 2.4.49 -------------------------------------------------------------------------------- ChangeLog:
* Thu Sep 16 2021 Lubo�� Uhliarik luhliari@redhat.com - 2.4.49-1 - new version 2.4.49 (#2004776) * Tue Sep 14 2021 Sahana Prasad sahana@redhat.com - 2.4.48-8 - Rebuilt with OpenSSL 3.0.0 * Fri Aug 6 2021 Lubo�� Uhliarik luhliari@redhat.com - 2.4.48-7 - add symlink to system logo for noindex test page * Fri Aug 6 2021 Joe Orton jorton@redhat.com - 2.4.48-4 - add OpenSSL 3.x compatibility patch * Thu Jul 22 2021 Fedora Release Engineering releng@fedoraproject.org - 2.4.48-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild * Fri Jul 16 2021 Joe Orton jorton@redhat.com - 2.4.48-2 - mod_cgi/mod_cgid: update to unification from trunk - httpd.conf: add note on care with Listen and starting at boot -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1968280 - CVE-2020-35452 httpd: Single zero byte stack overflow in mod_auth_digest [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1968280 [ 2 ] Bug #1968308 - CVE-2021-26690 httpd: mod_session NULL pointer dereference in parser [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1968308 [ 3 ] Bug #1969233 - CVE-2021-26691 httpd: Heap overflow in mod_session [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1969233 [ 4 ] Bug #1969234 - CVE-2020-13950 httpd: mod_proxy NULL pointer dereference [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1969234 [ 5 ] Bug #1969236 - CVE-2019-17567 httpd: mod_proxy_wstunnel tunneling of non Upgraded connection [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1969236 [ 6 ] Bug #1969241 - CVE-2021-30641 httpd: MergeSlashes regression [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1969241 [ 7 ] Bug #2005118 - CVE-2021-40438 httpd: mod_proxy: SSRF via a crafted request uri-path [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2005118 [ 8 ] Bug #2005120 - CVE-2021-39275 httpd: out-of-bounds write in ap_escape_quotes() via malicious input [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2005120 [ 9 ] Bug #2005125 - CVE-2021-36160 httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2005125 [ 10 ] Bug #2005129 - CVE-2021-34798 httpd: NULL pointer dereference via malformed requests [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2005129 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-dce7e7738e' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------