Fedora 34: httpd 2021-2a10bc68a4
Summary
The Apache HTTP Server is a powerful, efficient, and extensible
web server.
This update addresses CVE-2021-42013. It was found that the fix for
CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could
use a path traversal attack to map URLs to files outside the directories
configured by Alias-like directives. If files outside of these directories
are not protected by the usual default configuration "require all denied", these
requests can succeed. If CGI scripts are also enabled for these aliased pathes,
this could allow for remote code execution.
* Thu Oct 7 2021 Patrick Uiterwijk
- new version 2.4.51
[ 1 ] Bug #2010758 - CVE-2021-41773 httpd: path traversal and file disclosure vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2010758
[ 2 ] Bug #2011901 - CVE-2021-42013 httpd: path traversal and remote code execution (incomplete fix of CVE-2021-41773) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2011901
su -c 'dnf upgrade --advisory FEDORA-2021-2a10bc68a4' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
FEDORA-2021-2a10bc68a4 2021-10-12 23:37:48.488663 Product : Fedora 34 Version : 2.4.51 Release : 1.fc34 URL : https://httpd.apache.org/ Summary : Apache HTTP Server Description : The Apache HTTP Server is a powerful, efficient, and extensible web server. This update addresses CVE-2021-42013. It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. * Thu Oct 7 2021 Patrick Uiterwijk - 2.4.51-1 - new version 2.4.51 [ 1 ] Bug #2010758 - CVE-2021-41773 httpd: path traversal and file disclosure vulnerability [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2010758 [ 2 ] Bug #2011901 - CVE-2021-42013 httpd: path traversal and remote code execution (incomplete fix of CVE-2021-41773) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2011901 su -c 'dnf upgrade --advisory FEDORA-2021-2a10bc68a4' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/ Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Change Log
References