-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2019-2d8ee47f61 2019-04-10 02:47:32.732615 --------------------------------------------------------------------------------
Name : mod_auth_mellon Product : Fedora 30 Version : 0.14.2 Release : 1.fc30 URL : https://github.com/UNINETT/mod_auth_mellon Summary : A SAML 2.0 authentication module for the Apache Httpd Server Description : The mod_auth_mellon module is an authentication service that implements the SAML 2.0 federation protocol. It grants access based on the attributes received in assertions generated by a IdP server.
-------------------------------------------------------------------------------- Update Information:
New upstream release 0.14.2 which also fixes CVE-2019-3878 and CVE-2019-3877 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1691771 - CVE-2019-3877 mod_auth_mellon: open redirect in logout url when using URLs with backslashes [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1691771 [ 2 ] Bug #1691136 - CVE-2019-3878 mod_auth_mellon: authentication bypass in ECP flow [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1691136 [ 3 ] Bug #1691127 - mod_auth_mellon: authentication bypass in ECP flow [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1691127 [ 4 ] Bug #1674418 - mod_auth_mellon-0.14.2 is available https://bugzilla.redhat.com/show_bug.cgi?id=1674418 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2019-2d8ee47f61' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------