Fedora 27 : httpd (2018-c3dc008c54)

Medium Nessus Plugin ID 111401

Synopsis

The remote Fedora host is missing a security update.

Description

This update includes the latest upstream release,

**httpd 2.4.34**, with multiple bug fixes and enhancements. See http://www.apache.org/dist/httpd/CHANGES_2.4.34 for more information on the changes in this version.

A security vulnerability is addressed in this update :

- `mod_md`: DoS via Coredumps on specially crafted requests (CVE-2018-8011) The following changes are also included in this update :

- The post-transaction scriptlet to restart `httpd.service` no longer blocks waiting for the restart to complete.

- `mod_ssl` now supports loading private keys (and associated certificates) from a PKCS#11 provider. Use a `pkcs11:` URI in the `SSLCertificateKeyFile` (and optionally `SSLCertificateFile`) directive(s).

- An example Lua-based `server-status.conf` is packaged in the docdir

- `httpd` now Obsoletes `mod_proxy_uwsgi` (RHBZ#1599113)

- `mod_systemd` now logs listening ports at startup

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected httpd package.

See Also

http://www.apache.org/dist/httpd/CHANGES_2.4.34

https://bodhi.fedoraproject.org/updates/FEDORA-2018-c3dc008c54

Plugin Details

Severity: Medium

ID: 111401

File Name: fedora_2018-c3dc008c54.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2018/07/30

Modified: 2018/09/17

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSSv3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:httpd, cpe:/o:fedoraproject:fedora:27

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2018/07/30

Reference Information

CVE: CVE-2018-8011