--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2021-2a10bc68a4
2021-10-12 23:37:48.488663
--------------------------------------------------------------------------------Name        : httpd
Product     : Fedora 34
Version     : 2.4.51
Release     : 1.fc34
URL         : https://httpd.apache.org/
Summary     : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

--------------------------------------------------------------------------------Update Information:

This update addresses CVE-2021-42013.  It was found that the fix for
CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could
use a path traversal attack to map URLs to files outside the directories
configured by Alias-like directives.    If files outside of these directories
are not protected by the usual default configuration "require all denied", these
requests can succeed. If CGI scripts are also enabled for these aliased pathes,
this could allow for remote code execution.
--------------------------------------------------------------------------------ChangeLog:

* Thu Oct  7 2021 Patrick Uiterwijk  - 2.4.51-1
- new version 2.4.51
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #2010758 - CVE-2021-41773 httpd: path traversal and file disclosure vulnerability [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2010758
  [ 2 ] Bug #2011901 - CVE-2021-42013 httpd: path traversal and remote code execution (incomplete fix of CVE-2021-41773) [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2011901
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-2a10bc68a4' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 34: httpd 2021-2a10bc68a4

October 12, 2021
This update addresses CVE-2021-42013

Summary

The Apache HTTP Server is a powerful, efficient, and extensible

web server.

This update addresses CVE-2021-42013. It was found that the fix for

CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could

use a path traversal attack to map URLs to files outside the directories

configured by Alias-like directives. If files outside of these directories

are not protected by the usual default configuration "require all denied", these

requests can succeed. If CGI scripts are also enabled for these aliased pathes,

this could allow for remote code execution.

* Thu Oct 7 2021 Patrick Uiterwijk - 2.4.51-1

- new version 2.4.51

[ 1 ] Bug #2010758 - CVE-2021-41773 httpd: path traversal and file disclosure vulnerability [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=2010758

[ 2 ] Bug #2011901 - CVE-2021-42013 httpd: path traversal and remote code execution (incomplete fix of CVE-2021-41773) [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=2011901

su -c 'dnf upgrade --advisory FEDORA-2021-2a10bc68a4' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

FEDORA-2021-2a10bc68a4 2021-10-12 23:37:48.488663 Product : Fedora 34 Version : 2.4.51 Release : 1.fc34 URL : https://httpd.apache.org/ Summary : Apache HTTP Server Description : The Apache HTTP Server is a powerful, efficient, and extensible web server. This update addresses CVE-2021-42013. It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. * Thu Oct 7 2021 Patrick Uiterwijk - 2.4.51-1 - new version 2.4.51 [ 1 ] Bug #2010758 - CVE-2021-41773 httpd: path traversal and file disclosure vulnerability [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2010758 [ 2 ] Bug #2011901 - CVE-2021-42013 httpd: path traversal and remote code execution (incomplete fix of CVE-2021-41773) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2011901 su -c 'dnf upgrade --advisory FEDORA-2021-2a10bc68a4' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/ Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Change Log

References

Update Instructions

Severity
Product : Fedora 34
Version : 2.4.51
Release : 1.fc34
URL : https://httpd.apache.org/
Summary : Apache HTTP Server

Related News