You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa mod_cluster

Sigurnosni nedostatak programskog paketa mod_cluster

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2019-17556e2ad6
2019-05-10 02:21:33.370624
——————————————————————————–

Name : mod_cluster
Product : Fedora 29
Version : 1.3.11
Release : 1.fc29
URL : http://modcluster.io/
Summary : Apache HTTP Server dynamic load balancer with Wildfly and Tomcat libraries
Description :
Mod_cluster is an httpd-based load balancer. Like mod_jk and mod_proxy,
mod_cluster uses a communication channel to forward requests from httpd to one
of a set of application server nodes. Unlike mod_jk and mod_proxy, mod_cluster
leverages an additional connection between the application server nodes and
httpd. The application server nodes use this connection to transmit server-side
load balance factors and lifecycle events back to httpd via a custom set of
HTTP methods, affectionately called the Mod-Cluster Management Protocol (MCMP).
This additional feedback channel allows mod_cluster to offer a level of
intelligence and granularity not found in other load balancing solutions.

——————————————————————————–
Update Information:

Security, Performance updates, fiexes blocker with crashing httpd BZ 1708248
——————————————————————————–
ChangeLog:

* Thu May 9 2019 Michal Karm Babacek <karm@fedoraproject.org> 1.3.11-1
– Updates comments about Selinux in mod_cluster.conf
– Removes Java libs for Tomcat 8 and Wildfly 10, to be reintroduced for Tomcat 9 in a separate package
– Fix for MODCLUSTER-690
– Back port upstream warning fixes
– Fix for MODCLUSTER-543
– Fix forMODCLUSTER-684
– Fix 503 found while investigating MODCLUSTER-684
– Fix for JBCS-634 decrease loops per vhosts for balancer changes
– Fix for MODCLUSTER-622 segfault in process_info
– Fix for MODCLUSTER-582 and clean some C++ comments
– Fix for MODCLUSTER-590 – workers array for Deterministic failover is now allocated dynamically
– Fix for MODCLUSTER-526 We don’t use helper->shared if it’s already NULL
– Fix for MODCLUSTER-550 Failover targets should be chosen deterministically
– Fix for MODCLUSTER-547
– Fix CVE-2016-8612 JBCS-193
– Fix for MODCLUSTER-522
– Fix for MODCLUSTER-534 update to MODCLUSTER-435 normalizing balancer name
– Security enhancements for protocol parser
* Fri Feb 1 2019 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.3-14
– Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.3-13
– Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Thu Feb 8 2018 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.3-12
– Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1374210 – CVE-2016-3110 mod_cluster: remotely Segfault Apache http server [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1374210
[ 2 ] Bug #1708248 – Segfaults in Apache after updating packages (using mod_cluster and mod_ssl)
https://bugzilla.redhat.com/show_bug.cgi?id=1708248
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-17556e2ad6’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2019-3877efca99
2019-05-10 01:35:04.470032
——————————————————————————–

Name : mod_cluster
Product : Fedora 28
Version : 1.3.11
Release : 1.fc28
URL : http://modcluster.io/
Summary : Apache HTTP Server dynamic load balancer with Wildfly and Tomcat libraries
Description :
Mod_cluster is an httpd-based load balancer. Like mod_jk and mod_proxy,
mod_cluster uses a communication channel to forward requests from httpd to one
of a set of application server nodes. Unlike mod_jk and mod_proxy, mod_cluster
leverages an additional connection between the application server nodes and
httpd. The application server nodes use this connection to transmit server-side
load balance factors and lifecycle events back to httpd via a custom set of
HTTP methods, affectionately called the Mod-Cluster Management Protocol (MCMP).
This additional feedback channel allows mod_cluster to offer a level of
intelligence and granularity not found in other load balancing solutions.

——————————————————————————–
Update Information:

Security, Performance updates, fiexes blocker with crashing httpd BZ 1708248
——————————————————————————–
ChangeLog:

* Thu May 9 2019 Michal Karm Babacek <karm@fedoraproject.org> 1.3.11-1
– Updates comments about Selinux in mod_cluster.conf
– Removes Java libs for Tomcat 8 and Wildfly 10, to be reintroduced for Tomcat 9 in a separate package
– Fix for MODCLUSTER-690
– Back port upstream warning fixes
– Fix for MODCLUSTER-543
– Fix forMODCLUSTER-684
– Fix 503 found while investigating MODCLUSTER-684
– Fix for JBCS-634 decrease loops per vhosts for balancer changes
– Fix for MODCLUSTER-622 segfault in process_info
– Fix for MODCLUSTER-582 and clean some C++ comments
– Fix for MODCLUSTER-590 – workers array for Deterministic failover is now allocated dynamically
– Fix for MODCLUSTER-526 We don’t use helper->shared if it’s already NULL
– Fix for MODCLUSTER-550 Failover targets should be chosen deterministically
– Fix for MODCLUSTER-547
– Fix CVE-2016-8612 JBCS-193
– Fix for MODCLUSTER-522
– Fix for MODCLUSTER-534 update to MODCLUSTER-435 normalizing balancer name
– Security enhancements for protocol parser
* Fri Feb 1 2019 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.3-14
– Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.3-13
– Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Thu Feb 8 2018 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.3-12
– Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1374210 – CVE-2016-3110 mod_cluster: remotely Segfault Apache http server [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1374210
[ 2 ] Bug #1708248 – Segfaults in Apache after updating packages (using mod_cluster and mod_ssl)
https://bugzilla.redhat.com/show_bug.cgi?id=1708248
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-3877efca99’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2019-7813edd5a2
2019-05-10 00:46:38.157862
——————————————————————————–

Name : mod_cluster
Product : Fedora 30
Version : 1.3.11
Release : 1.fc30
URL : http://modcluster.io/
Summary : Apache HTTP Server dynamic load balancer with Wildfly and Tomcat libraries
Description :
Mod_cluster is an httpd-based load balancer. Like mod_jk and mod_proxy,
mod_cluster uses a communication channel to forward requests from httpd to one
of a set of application server nodes. Unlike mod_jk and mod_proxy, mod_cluster
leverages an additional connection between the application server nodes and
httpd. The application server nodes use this connection to transmit server-side
load balance factors and lifecycle events back to httpd via a custom set of
HTTP methods, affectionately called the Mod-Cluster Management Protocol (MCMP).
This additional feedback channel allows mod_cluster to offer a level of
intelligence and granularity not found in other load balancing solutions.

——————————————————————————–
Update Information:

Security, Performance updates, fiexes blocker with crashing httpd BZ 1708248
——————————————————————————–
ChangeLog:

* Thu May 9 2019 Michal Karm Babacek <karm@fedoraproject.org> 1.3.11-1
– Updates comments about Selinux in mod_cluster.conf
– Removes Java libs for Tomcat 8 and Wildfly 10, to be reintroduced for Tomcat 9 in a separate package
– Fix for MODCLUSTER-690
– Back port upstream warning fixes
– Fix for MODCLUSTER-543
– Fix forMODCLUSTER-684
– Fix 503 found while investigating MODCLUSTER-684
– Fix for JBCS-634 decrease loops per vhosts for balancer changes
– Fix for MODCLUSTER-622 segfault in process_info
– Fix for MODCLUSTER-582 and clean some C++ comments
– Fix for MODCLUSTER-590 – workers array for Deterministic failover is now allocated dynamically
– Fix for MODCLUSTER-526 We don’t use helper->shared if it’s already NULL
– Fix for MODCLUSTER-550 Failover targets should be chosen deterministically
– Fix for MODCLUSTER-547
– Fix CVE-2016-8612 JBCS-193
– Fix for MODCLUSTER-522
– Fix for MODCLUSTER-534 update to MODCLUSTER-435 normalizing balancer name
– Security enhancements for protocol parser
* Fri Feb 1 2019 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.3-14
– Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.3-13
– Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Thu Feb 8 2018 Fedora Release Engineering <releng@fedoraproject.org> – 1.3.3-12
– Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1374210 – CVE-2016-3110 mod_cluster: remotely Segfault Apache http server [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1374210
[ 2 ] Bug #1708248 – Segfaults in Apache after updating packages (using mod_cluster and mod_ssl)
https://bugzilla.redhat.com/show_bug.cgi?id=1708248
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-7813edd5a2’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorToni Vugdelija
Cert idNCERT-REF-2019-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak jezgre operacijskog sustava

Otkriven je sigurnosni nedostatak jezgre operacijskog sustava Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja. Savjetuje se ažuriranje izdanim...

Close