stable

httpd-2.4.61-1.fc40

FEDORA-2024-39f1a828ed created by luhliarik 10 months ago for Fedora 40
  • version update
  • security update

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2024-39f1a828ed

This update has been submitted for testing by luhliarik.

10 months ago

This update's test gating status has been changed to 'waiting'.

10 months ago

This update's test gating status has been changed to 'passed'.

10 months ago

This update has been pushed to testing.

10 months ago
User Icon bojan commented & provided feedback 10 months ago
karma

Works.

User Icon nixuser commented & provided feedback 10 months ago
karma

Working for me.

This update can be pushed to stable now if the maintainer wishes

10 months ago
karma

This update has been submitted for stable by bodhi.

10 months ago

This update has been pushed to stable.

10 months ago

Please log in to add feedback.

Metadata
Type
security
Severity
high
Karma
3
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
10 months ago
in testing
10 months ago
in stable
10 months ago
approved
10 months ago
BZ#2295106 CVE-2024-39573 httpd: Potential SSRF in mod_rewrite [fedora-all]
0
0
BZ#2295107 CVE-2024-38477 httpd: null pointer dereference in mod_proxy [fedora-all]
0
0
BZ#2295108 CVE-2024-38475 httpd: Improper escaping of output in mod_rewrite [fedora-all]
0
0
BZ#2295109 CVE-2024-38473 httpd: Encoding problem in mod_proxy [fedora-all]
0
0
BZ#2295111 CVE-2024-38474 httpd: Substitution encoding issue in mod_rewrite [fedora-all]
0
0
BZ#2295637 CVE-2024-38476 httpd: Security issues via backend applications whose response headers are malicious or exploitable [fedora-all]
0
0

Automated Test Results

Test Cases

0 0 Test Case HTTPd