Fedora 28: mod_cluster Security Update

    Date 09 May 2019
    436
    Posted By LinuxSecurity Advisories
    Security, Performance updates, fiexes blocker with crashing httpd BZ 1708248
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2019-3877efca99
    2019-05-10 01:35:04.470032
    --------------------------------------------------------------------------------
    
    Name        : mod_cluster
    Product     : Fedora 28
    Version     : 1.3.11
    Release     : 1.fc28
    URL         : https://modcluster.io/
    Summary     : Apache HTTP Server dynamic load balancer with Wildfly and Tomcat libraries
    Description :
    Mod_cluster is an httpd-based load balancer. Like mod_jk and mod_proxy,
    mod_cluster uses a communication channel to forward requests from httpd to one
    of a set of application server nodes. Unlike mod_jk and mod_proxy, mod_cluster
    leverages an additional connection between the application server nodes and
    httpd. The application server nodes use this connection to transmit server-side
    load balance factors and lifecycle events back to httpd via a custom set of
    HTTP methods, affectionately called the Mod-Cluster Management Protocol (MCMP).
    This additional feedback channel allows mod_cluster to offer a level of
    intelligence and granularity not found in other load balancing solutions.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Security, Performance updates, fiexes blocker with crashing httpd BZ 1708248
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Thu May  9 2019 Michal Karm Babacek  1.3.11-1
    - Updates comments about Selinux in mod_cluster.conf
    - Removes Java libs for Tomcat 8 and Wildfly 10, to be reintroduced for Tomcat 9 in a separate package
    - Fix for MODCLUSTER-690
    - Back port upstream warning fixes
    - Fix for MODCLUSTER-543
    - Fix forMODCLUSTER-684
    - Fix 503 found while investigating MODCLUSTER-684
    - Fix for JBCS-634 decrease loops per vhosts for balancer changes
    - Fix for MODCLUSTER-622 segfault in process_info
    - Fix for MODCLUSTER-582 and clean some C++ comments
    - Fix for MODCLUSTER-590 - workers array for Deterministic failover is now allocated dynamically
    - Fix for MODCLUSTER-526 We don't use helper->shared if it's already NULL
    - Fix for MODCLUSTER-550 Failover targets should be chosen deterministically
    - Fix for MODCLUSTER-547
    - Fix CVE-2016-8612 JBCS-193
    - Fix for MODCLUSTER-522
    - Fix for MODCLUSTER-534 update to MODCLUSTER-435 normalizing balancer name
    - Security enhancements for protocol parser
    * Fri Feb  1 2019 Fedora Release Engineering  - 1.3.3-14
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
    * Fri Jul 13 2018 Fedora Release Engineering  - 1.3.3-13
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
    * Thu Feb  8 2018 Fedora Release Engineering  - 1.3.3-12
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1374210 - CVE-2016-3110 mod_cluster: remotely Segfault Apache http server [fedora-all]
            https://bugzilla.redhat.com/show_bug.cgi?id=1374210
      [ 2 ] Bug #1708248 - Segfaults in Apache after updating packages (using mod_cluster and mod_ssl)
            https://bugzilla.redhat.com/show_bug.cgi?id=1708248
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2019-3877efca99' at the command
    line. For more information, refer to the dnf documentation available at
    https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"3","type":"x","order":"1","pct":42.86,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"2","type":"x","order":"3","pct":28.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.