Fedora 29: mod_cluster Security Update

    Date 09 May 2019
    387
    Posted By LinuxSecurity Advisories
    Security, Performance updates, fiexes blocker with crashing httpd BZ 1708248
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2019-17556e2ad6
    2019-05-10 02:21:33.370624
    --------------------------------------------------------------------------------
    
    Name        : mod_cluster
    Product     : Fedora 29
    Version     : 1.3.11
    Release     : 1.fc29
    URL         : https://modcluster.io/
    Summary     : Apache HTTP Server dynamic load balancer with Wildfly and Tomcat libraries
    Description :
    Mod_cluster is an httpd-based load balancer. Like mod_jk and mod_proxy,
    mod_cluster uses a communication channel to forward requests from httpd to one
    of a set of application server nodes. Unlike mod_jk and mod_proxy, mod_cluster
    leverages an additional connection between the application server nodes and
    httpd. The application server nodes use this connection to transmit server-side
    load balance factors and lifecycle events back to httpd via a custom set of
    HTTP methods, affectionately called the Mod-Cluster Management Protocol (MCMP).
    This additional feedback channel allows mod_cluster to offer a level of
    intelligence and granularity not found in other load balancing solutions.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Security, Performance updates, fiexes blocker with crashing httpd BZ 1708248
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Thu May  9 2019 Michal Karm Babacek  1.3.11-1
    - Updates comments about Selinux in mod_cluster.conf
    - Removes Java libs for Tomcat 8 and Wildfly 10, to be reintroduced for Tomcat 9 in a separate package
    - Fix for MODCLUSTER-690
    - Back port upstream warning fixes
    - Fix for MODCLUSTER-543
    - Fix forMODCLUSTER-684
    - Fix 503 found while investigating MODCLUSTER-684
    - Fix for JBCS-634 decrease loops per vhosts for balancer changes
    - Fix for MODCLUSTER-622 segfault in process_info
    - Fix for MODCLUSTER-582 and clean some C++ comments
    - Fix for MODCLUSTER-590 - workers array for Deterministic failover is now allocated dynamically
    - Fix for MODCLUSTER-526 We don't use helper->shared if it's already NULL
    - Fix for MODCLUSTER-550 Failover targets should be chosen deterministically
    - Fix for MODCLUSTER-547
    - Fix CVE-2016-8612 JBCS-193
    - Fix for MODCLUSTER-522
    - Fix for MODCLUSTER-534 update to MODCLUSTER-435 normalizing balancer name
    - Security enhancements for protocol parser
    * Fri Feb  1 2019 Fedora Release Engineering  - 1.3.3-14
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
    * Fri Jul 13 2018 Fedora Release Engineering  - 1.3.3-13
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
    * Thu Feb  8 2018 Fedora Release Engineering  - 1.3.3-12
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1374210 - CVE-2016-3110 mod_cluster: remotely Segfault Apache http server [fedora-all]
            https://bugzilla.redhat.com/show_bug.cgi?id=1374210
      [ 2 ] Bug #1708248 - Segfaults in Apache after updating packages (using mod_cluster and mod_ssl)
            https://bugzilla.redhat.com/show_bug.cgi?id=1708248
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2019-17556e2ad6' at the command
    line. For more information, refer to the dnf documentation available at
    https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"14","type":"x","order":"1","pct":60.87,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":39.13,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.