You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mod_md

Sigurnosni nedostaci programskog paketa mod_md

——————————————————————————–
Fedora Update Notification
FEDORA-2019-e00c65ec6f
2019-09-30 01:38:57.532586
——————————————————————————–

Name : mod_md
Product : Fedora 29
Version : 2.0.8
Release : 3.fc29
URL : https://icing.github.io/mod_md/
Summary : Certificate provisioning using ACME for the Apache HTTP Server
Description :
This module manages common properties of domains for one or more
virtual hosts. Specifically it can use the ACME protocol (RFC Draft)
to automate certificate provisioning. These will be configured for
managed domains and their virtual hosts automatically. This includes
renewal of certificates before they expire.

——————————————————————————–
Update Information:

This update includes the latest release of the Apache HTTP Server, version
`2.4.41`, fixing various security issues. Several major enhancements are also
included in this update: * `mod_md` is now packaged from upstream *github*
releases. * `mod_cgid` stderr handling has been improved See
http://www.apache.org/dist/httpd/CHANGES_2.4.41 for a full list of changes since
the previous release of `httpd`.
——————————————————————————–
References:

[ 1 ] Bug #1727434 – Fedora apachectl script behaves differently than authors design it
https://bugzilla.redhat.com/show_bug.cgi?id=1727434
[ 2 ] Bug #1743961 – CVE-2019-10098 httpd: mod_rewrite potential open redirect [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1743961
[ 3 ] Bug #1743957 – CVE-2019-10092 httpd: limited cross-site scripting in mod_proxy error page [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1743957
[ 4 ] Bug #1591157 – Unusable entries in error_log when event MPM is activated
https://bugzilla.redhat.com/show_bug.cgi?id=1591157
[ 5 ] Bug #1743997 – CVE-2019-10097 httpd: null-pointer dereference in mod_remoteip [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1743997
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-e00c65ec6f’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa krb5

Otkriven je sigurnosni nedostatak u programskom paketu krb5 za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim udaljenim napadačima omogućuje izazivanje DoS...

Close