Zwei Probleme in mod_auth_mellon
ID: | FEDORA-2019-2d8ee47f61 |
Distribution: | Fedora |
Plattformen: | Fedora 30 |
Datum: | Mi, 10. April 2019, 07:38 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3877 https://bugzilla.redhat.com/show_bug.cgi?id=1674418 https://bugzilla.redhat.com/show_bug.cgi?id=1691127 |
Applikationen: | mod_auth_mellon |
Originalnachricht |
|
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2019-2d8ee47f61 2019-04-10 02:47:32.732615 -------------------------------------------------------------------------------- Name : mod_auth_mellon Product : Fedora 30 Version : 0.14.2 Release : 1.fc30 URL : https://github.com/UNINETT/mod_auth_mellon Summary : A SAML 2.0 authentication module for the Apache Httpd Server Description : The mod_auth_mellon module is an authentication service that implements the SAML 2.0 federation protocol. It grants access based on the attributes received in assertions generated by a IdP server. -------------------------------------------------------------------------------- Update Information: New upstream release 0.14.2 which also fixes CVE-2019-3878 and CVE-2019-3877 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1691771 - CVE-2019-3877 mod_auth_mellon: open redirect in logout url when using URLs with backslashes [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1691771 [ 2 ] Bug #1691136 - CVE-2019-3878 mod_auth_mellon: authentication bypass in ECP flow [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1691136 [ 3 ] Bug #1691127 - mod_auth_mellon: authentication bypass in ECP flow [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1691127 [ 4 ] Bug #1674418 - mod_auth_mellon-0.14.2 is available https://bugzilla.redhat.com/show_bug.cgi?id=1674418 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2019-2d8ee47f61' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org |