--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2018-375e3244b6
2018-04-05 23:56:01.161354
--------------------------------------------------------------------------------Name        : httpd
Product     : Fedora 27
Version     : 2.4.33
Release     : 2.fc27
URL         : https://httpd.apache.org/
Summary     : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

--------------------------------------------------------------------------------Update Information:

This update includes the latest upstream release of the Apache HTTP Server,
version 2.4.33.  A number of security vulnerabilities are fixed in this release:
* *Low*: Possible out of bound read in mod_cache_socache (CVE-2018-1303) *
*Low*: Possible out of bound access after failure in reading the HTTP request
(CVE-2018-1301) * *Low*: Weak Digest auth nonce generation in mod_auth_digest
(CVE-2018-1312) * *Low*: <FilesMatch> bypass with a trailing newline in
the file name (CVE-2017-15715) * *Low*: Out of bound write in mod_authnz_ldap
when using too small Accept-Language values (CVE-2017-15710)  * *Moderate*:
Tampering of mod_session data for CGI applications (CVE-2018-1283)  For more
information about changes in this release, see:
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1560174 - httpd-2.4.33 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1560174
  [ 2 ] Bug #1560618 - CVE-2017-15715 httpd:  bypass with a trailing newline in the file name [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1560618
  [ 3 ] Bug #1560644 - CVE-2018-1301 httpd: Out of bound access after failure in reading the HTTP request [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1560644
  [ 4 ] Bug #1560635 - CVE-2018-1312 httpd: Weak Digest auth nonce generation in mod_auth_digest [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1560635
  [ 5 ] Bug #1560400 - CVE-2018-1303 httpd: http: Out of bounds read in mod_cache_socache can allow a remote attacker to cause a denial of service [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1560400
  [ 6 ] Bug #1560396 - CVE-2018-1283 httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1560396
  [ 7 ] Bug #1560616 - CVE-2017-15710 httpd: Out of bound write in mod_authnz_ldap when using too small Accept-Language values [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1560616
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade httpd' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora 27: httpd Security Update

April 5, 2018
This update includes the latest upstream release of the Apache HTTP Server, version 2.4.33

Summary

The Apache HTTP Server is a powerful, efficient, and extensible

web server.

This update includes the latest upstream release of the Apache HTTP Server,

version 2.4.33. A number of security vulnerabilities are fixed in this release:

* *Low*: Possible out of bound read in mod_cache_socache (CVE-2018-1303) *

*Low*: Possible out of bound access after failure in reading the HTTP request

(CVE-2018-1301) * *Low*: Weak Digest auth nonce generation in mod_auth_digest

(CVE-2018-1312) * *Low*: <FilesMatch> bypass with a trailing newline in

the file name (CVE-2017-15715) * *Low*: Out of bound write in mod_authnz_ldap

when using too small Accept-Language values (CVE-2017-15710) * *Moderate*:

Tampering of mod_session data for CGI applications (CVE-2018-1283) For more

information about changes in this release, see:

[ 1 ] Bug #1560174 - httpd-2.4.33 is available

https://bugzilla.redhat.com/show_bug.cgi?id=1560174

[ 2 ] Bug #1560618 - CVE-2017-15715 httpd: bypass with a trailing newline in the file name [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1560618

[ 3 ] Bug #1560644 - CVE-2018-1301 httpd: Out of bound access after failure in reading the HTTP request [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1560644

[ 4 ] Bug #1560635 - CVE-2018-1312 httpd: Weak Digest auth nonce generation in mod_auth_digest [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1560635

[ 5 ] Bug #1560400 - CVE-2018-1303 httpd: http: Out of bounds read in mod_cache_socache can allow a remote attacker to cause a denial of service [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1560400

[ 6 ] Bug #1560396 - CVE-2018-1283 httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1560396

[ 7 ] Bug #1560616 - CVE-2017-15710 httpd: Out of bound write in mod_authnz_ldap when using too small Accept-Language values [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1560616

su -c 'dnf upgrade httpd' at the command line.

For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

FEDORA-2018-375e3244b6 2018-04-05 23:56:01.161354 Product : Fedora 27 Version : 2.4.33 Release : 2.fc27 URL : https://httpd.apache.org/ Summary : Apache HTTP Server Description : The Apache HTTP Server is a powerful, efficient, and extensible web server. This update includes the latest upstream release of the Apache HTTP Server, version 2.4.33. A number of security vulnerabilities are fixed in this release: * *Low*: Possible out of bound read in mod_cache_socache (CVE-2018-1303) * *Low*: Possible out of bound access after failure in reading the HTTP request (CVE-2018-1301) * *Low*: Weak Digest auth nonce generation in mod_auth_digest (CVE-2018-1312) * *Low*: <FilesMatch> bypass with a trailing newline in the file name (CVE-2017-15715) * *Low*: Out of bound write in mod_authnz_ldap when using too small Accept-Language values (CVE-2017-15710) * *Moderate*: Tampering of mod_session data for CGI applications (CVE-2018-1283) For more information about changes in this release, see: [ 1 ] Bug #1560174 - httpd-2.4.33 is available https://bugzilla.redhat.com/show_bug.cgi?id=1560174 [ 2 ] Bug #1560618 - CVE-2017-15715 httpd: bypass with a trailing newline in the file name [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1560618 [ 3 ] Bug #1560644 - CVE-2018-1301 httpd: Out of bound access after failure in reading the HTTP request [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1560644 [ 4 ] Bug #1560635 - CVE-2018-1312 httpd: Weak Digest auth nonce generation in mod_auth_digest [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1560635 [ 5 ] Bug #1560400 - CVE-2018-1303 httpd: http: Out of bounds read in mod_cache_socache can allow a remote attacker to cause a denial of service [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1560400 [ 6 ] Bug #1560396 - CVE-2018-1283 httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1560396 [ 7 ] Bug #1560616 - CVE-2017-15710 httpd: Out of bound write in mod_authnz_ldap when using too small Accept-Language values [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1560616 su -c 'dnf upgrade httpd' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 27
Version : 2.4.33
Release : 2.fc27
URL : https://httpd.apache.org/
Summary : Apache HTTP Server

Related News