--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2019-2d8ee47f61
2019-04-10 02:47:32.732615
--------------------------------------------------------------------------------
Name : mod_auth_mellon
Product : Fedora 30
Version : 0.14.2
Release : 1.fc30
URL :
https://github.com/UNINETT/mod_auth_mellon
Summary : A SAML 2.0 authentication module for the Apache Httpd Server
Description :
The mod_auth_mellon module is an authentication service that implements the
SAML 2.0 federation protocol. It grants access based on the attributes
received in assertions generated by a IdP server.
--------------------------------------------------------------------------------
Update Information:
New upstream release 0.14.2 which also fixes CVE-2019-3878 and CVE-2019-3877
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1691771 - CVE-2019-3877 mod_auth_mellon: open redirect in logout url when
using URLs with backslashes [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1691771
[ 2 ] Bug #1691136 - CVE-2019-3878 mod_auth_mellon: authentication bypass in ECP flow
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1691136
[ 3 ] Bug #1691127 - mod_auth_mellon: authentication bypass in ECP flow [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1691127
[ 4 ] Bug #1674418 - mod_auth_mellon-0.14.2 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1674418
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-2d8ee47f61' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------