You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa httpd

Sigurnosni nedostatak programskog paketa httpd

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2018-49d3b42425
2018-07-25 19:49:07.673112
——————————————————————————–

Name : httpd
Product : Fedora 28
Version : 2.4.34
Release : 3.fc28
URL : https://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

——————————————————————————–
Update Information:

This update includes the latest upstream release, **httpd 2.4.34**, with
multiple bug fixes and enhancements. See
http://www.apache.org/dist/httpd/CHANGES_2.4.34 for more information on the
changes in this version. A security vulnerability is addressed in this update:
* `mod_md`: DoS via Coredumps on specially crafted requests (CVE-2018-8011)
The following changes are also included in this update: * The post-transaction
scriptlet to restart `httpd.service` no longer blocks waiting for the restart to
complete. * `mod_ssl` now supports loading private keys (and associated
certificates) from a PKCS#11 provider. Use a `pkcs11:` URI in the
`SSLCertificateKeyFile` (and optionally `SSLCertificateFile`) directive(s). * An
example Lua-based `server-status.conf` is packaged in the docdir * `httpd` now
Obsoletes `mod_proxy_uwsgi` (RHBZ#1599113) * `mod_systemd` now logs listening
ports at startup
——————————————————————————–
ChangeLog:

* Fri Jul 20 2018 Joe Orton <jorton@redhat.com> – 2.4.34-3
– mod_ssl: fix OCSP regression (upstream r1555631)
* Wed Jul 18 2018 Joe Orton <jorton@redhat.com> – 2.4.34-2
– update Obsoletes for mod_proxy_uswgi (#1599113)
* Wed Jul 18 2018 Joe Orton <jorton@redhat.com> – 2.4.34-1
– update to 2.4.34 (#1601160)
* Mon Jul 16 2018 Joe Orton <jorton@redhat.com> – 2.4.33-10
– don’t block on service try-restart in posttrans scriptlet
– add Lua-based /server-status example page to docs
– obsoletes: and provides: for mod_proxy_uswgi (#1599113)
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> – 2.4.33-9
– Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Fri Jul 6 2018 Joe Orton <jorton@redhat.com> – 2.4.33-8
– add per-request memory leak fix (upstream r1833014)
* Fri Jul 6 2018 Joe Orton <jorton@redhat.com> – 2.4.33-7
– mod_ssl: add PKCS#11 cert/key support (Anderson Sasaki)
* Tue Jun 12 2018 Joe Orton <jorton@redhat.com> – 2.4.33-6
– mod_systemd: show bound ports in status and log to journal
at startup.
* Thu Apr 19 2018 Joe Orton <jorton@redhat.com> – 2.4.33-5
– add httpd@.service; update httpd.service(8) and add new stub
* Mon Apr 16 2018 Joe Orton <jorton@redhat.com> – 2.4.33-4
– mod_md: change hard-coded default MdStoreDir to state/md (#1563846)
* Thu Apr 12 2018 Joe Orton <jorton@redhat.com> – 2.4.33-3
– mod_ssl: drop implicit ‘SSLEngine on’ for vhost w/o certs (#1564537)
——————————————————————————–
References:

[ 1 ] Bug #1605052 – CVE-2018-8011 httpd: mod_md: NULL pointer dereference causing httpd child process crash
https://bugzilla.redhat.com/show_bug.cgi?id=1605052
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-49d3b42425’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAKZ4JYHJT62MCIGQ4J2TCJI6CXXZRCB/

AutorDanijel Kozinovic
Cert idNCERT-REF-2018-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa dcraw

Otkriven je sigurnosni nedostatak u programskom paketu dcraw za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje napada uskraćivanja...

Close