You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mod_md

Sigurnosni nedostaci programskog paketa mod_md

——————————————————————————–
Fedora Update Notification
FEDORA-2019-099575a123
2019-08-23 01:26:06.889669
——————————————————————————–

Name : mod_md
Product : Fedora 30
Version : 2.0.8
Release : 2.fc30
URL : https://icing.github.io/mod_md/
Summary : Certificate provisioning using ACME for the Apache HTTP Server
Description :
This module manages common properties of domains for one or more
virtual hosts. Specifically it can use the ACME protocol (RFC Draft)
to automate certificate provisioning. These will be configured for
managed domains and their virtual hosts automatically. This includes
renewal of certificates before they expire.

——————————————————————————–
Update Information:

This update includes the latest release of the Apache HTTP Server, version
`2.4.41`, fixing various security issues. Several major enhancements are also
included in this update: * `mod_md` is now packaged from upstream *github*
releases, adding support for ACMEv2. * `mod_cgid` stderr handling has been
improved See http://www.apache.org/dist/httpd/CHANGES_2.4.41 for a full list of
changes since the previous release of `httpd`.
——————————————————————————–
References:

[ 1 ] Bug #1591157 – Unusable entries in error_log when event MPM is activated
https://bugzilla.redhat.com/show_bug.cgi?id=1591157
[ 2 ] Bug #1727434 – Fedora apachectl script behaves differently than authors design it
https://bugzilla.redhat.com/show_bug.cgi?id=1727434
[ 3 ] Bug #1743961 – CVE-2019-10098 httpd: mod_rewrite potential open redirect [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1743961
[ 4 ] Bug #1743957 – CVE-2019-10092 httpd: limited cross-site scripting in mod_proxy error page [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1743957
[ 5 ] Bug #1743997 – CVE-2019-10097 httpd: null-pointer dereference in mod_remoteip [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1743997
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-099575a123’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa httpd

Otkriveni su sigurnosni nedostaci u programskom paketu httpd za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja,...

Close