stable

httpd-2.4.61-1.fc40

FEDORA-2024-39f1a828ed created by luhliarik 5 months ago for Fedora 40
  • version update
  • security update

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2024-39f1a828ed

This update has been submitted for testing by luhliarik.

5 months ago

This update's test gating status has been changed to 'waiting'.

5 months ago

This update's test gating status has been changed to 'passed'.

5 months ago

This update has been pushed to testing.

5 months ago
User Icon bojan commented & provided feedback 5 months ago
karma

Works.

User Icon nixuser commented & provided feedback 5 months ago
karma

Working for me.

This update can be pushed to stable now if the maintainer wishes

5 months ago
karma

This update has been submitted for stable by bodhi.

5 months ago

This update has been pushed to stable.

5 months ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
3
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
5 months ago
in testing
5 months ago
in stable
5 months ago
approved
5 months ago
BZ#2295106 CVE-2024-39573 httpd: Potential SSRF in mod_rewrite [fedora-all]
0
0
BZ#2295107 CVE-2024-38477 httpd: null pointer dereference in mod_proxy [fedora-all]
0
0
BZ#2295108 CVE-2024-38475 httpd: Improper escaping of output in mod_rewrite [fedora-all]
0
0
BZ#2295109 CVE-2024-38473 httpd: Encoding problem in mod_proxy [fedora-all]
0
0
BZ#2295111 CVE-2024-38474 httpd: Substitution encoding issue in mod_rewrite [fedora-all]
0
0
BZ#2295637 CVE-2024-38476 httpd: Security issues via backend applications whose response headers are malicious or exploitable [fedora-all]
0
0

Automated Test Results

Test Cases

0 0 Test Case HTTPd