-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-e3f6dd670d 2021-09-24 20:04:10.620298 --------------------------------------------------------------------------------
Name : httpd Product : Fedora 35 Version : 2.4.49 Release : 1.fc35 URL : https://httpd.apache.org/ Summary : Apache HTTP Server Description : The Apache HTTP Server is a powerful, efficient, and extensible web server.
-------------------------------------------------------------------------------- Update Information:
New httpd release 2.4.49 -------------------------------------------------------------------------------- ChangeLog:
* Thu Sep 16 2021 Lubo�� Uhliarik luhliari@redhat.com - 2.4.49-1 - new version 2.4.49 (#2004776) * Tue Sep 14 2021 Sahana Prasad sahana@redhat.com - 2.4.48-8 - Rebuilt with OpenSSL 3.0.0 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1968280 - CVE-2020-35452 httpd: Single zero byte stack overflow in mod_auth_digest [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1968280 [ 2 ] Bug #1968308 - CVE-2021-26690 httpd: mod_session NULL pointer dereference in parser [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1968308 [ 3 ] Bug #1969233 - CVE-2021-26691 httpd: Heap overflow in mod_session [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1969233 [ 4 ] Bug #1969234 - CVE-2020-13950 httpd: mod_proxy NULL pointer dereference [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1969234 [ 5 ] Bug #1969236 - CVE-2019-17567 httpd: mod_proxy_wstunnel tunneling of non Upgraded connection [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1969236 [ 6 ] Bug #1969241 - CVE-2021-30641 httpd: MergeSlashes regression [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1969241 [ 7 ] Bug #2005118 - CVE-2021-40438 httpd: mod_proxy: SSRF via a crafted request uri-path [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2005118 [ 8 ] Bug #2005120 - CVE-2021-39275 httpd: out-of-bounds write in ap_escape_quotes() via malicious input [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2005120 [ 9 ] Bug #2005125 - CVE-2021-36160 httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2005125 [ 10 ] Bug #2005129 - CVE-2021-34798 httpd: NULL pointer dereference via malformed requests [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2005129 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-e3f6dd670d' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------
package-announce@lists.fedoraproject.org