You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mod_auth_mellon

Sigurnosni nedostaci programskog paketa mod_auth_mellon

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2019-db1e9b3002
2019-04-02 02:13:20.283766
——————————————————————————–

Name : mod_auth_mellon
Product : Fedora 29
Version : 0.14.0
Release : 5.fc29
URL : https://github.com/UNINETT/mod_auth_mellon
Summary : A SAML 2.0 authentication module for the Apache Httpd Server
Description :
The mod_auth_mellon module is an authentication service that implements the
SAML 2.0 federation protocol. It grants access based on the attributes
received in assertions generated by a IdP server.

——————————————————————————–
Update Information:

New upstream release 0.14.2 which also fixes CVE-2019-3878 and CVE-2019-3877
——————————————————————————–
ChangeLog:

* Fri Mar 22 2019 Jakub Hrozek <jhrozek@redhat.com> – 0.14.0-5
– Related: rhbz#1691771 – CVE-2019-3877 mod_auth_mellon: open redirect in
logout url when using URLs with backslashes
– Related: rhbz#1691136 – CVE-2019-3878 mod_auth_mellon: authentication
bypass in ECP flow
——————————————————————————–
References:

[ 1 ] Bug #1691771 – CVE-2019-3877 mod_auth_mellon: open redirect in logout url when using URLs with backslashes [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1691771
[ 2 ] Bug #1691136 – CVE-2019-3878 mod_auth_mellon: authentication bypass in ECP flow [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1691136
[ 3 ] Bug #1691127 – mod_auth_mellon: authentication bypass in ECP flow [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1691127
[ 4 ] Bug #1674418 – mod_auth_mellon-0.14.2 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1674418
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-db1e9b3002’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorJosip Papratovic
Cert idNCERT-REF-2019-04-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa drupal7

Otkriven je sigurnosni nedostatak u programskom paketu drupal7 za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje XSS napada....

Close