The Apache Haus Forum

Advanced search  

News:

Welcome to Apache Haus Distribution Forum

Pages: [1]   Go Down

Author Topic: Announcing the release of Apache 2.4.33  (Read 1832 times)

Gregg

  • Administrator
  • Member Elite
  • *****
  • Offline Offline
  • Posts: 831
Announcing the release of Apache 2.4.33
« on: March 22, 2018, 03:25:56 AM »

In this release the should be a mod_md that doesn't hang on renew and the proxy_balancer doesn't crash when it cannot find the proper place in memory.

Unfortunately, OpenSSL 1.0.2o & 1.1.0h will be released sometime on the 27th. So I get to do this all over again soon. Hope LibreSSL doesn't come out with it's next version also.

Dependency Details
APR Version:        1.6.3
APU Version:        1.6.1
Brotli Version:     1.0.3
Curl Version:       7.59.0
Expat Version:      2.2.5
Jansson Version:    2.11
LibXML2 Version:    2.9.8
LUA Version:        5.1.5
NGHTTP2 Version:    1.31.0
OpenSSL Version:    1.0.2n, 1.1.0g or LibreSSL 2.6.4
PCRE Version:       8.41
SQLite3 Version:    3.22.0
ZLib Version:       1.2.10


I'm not going to tell you there is any pressing emergency to upgrade until OpenSSl 1.0.2o and 1.1.0h come out next week but I'm not going to not to upgrade  :)

Should you decide to, you can get your copy of the new Apache HTTP Server from our download page as usual.

Enjoy
Logged

Gregg

  • Administrator
  • Member Elite
  • *****
  • Offline Offline
  • Posts: 831
Re: Announcing the release of Apache 2.4.33
« Reply #1 on: March 29, 2018, 07:55:08 AM »

OpenSSL has been updated to 1.0.2o & 1.1.0h

Nothing really serious with the fix in OpenSSL that concerns Apache, just one rated moderate and one low.

Constructed ASN.1 types with a recursive definition could exceed the stack (CVE-2018-0739)
==========================================================================================

Severity: Moderate

Constructed ASN.1 types with a recursive definition (such as can be found in
PKCS7) could eventually exceed the stack given malicious input with
excessive recursion. This could result in a Denial Of Service attack. There are
no such structures used within SSL/TLS that come from untrusted sources so this
is considered safe.

rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
=========================================================

Severity: Low

This issue has been reported in a previous OpenSSL security advisory and a fix
was provided for OpenSSL 1.0.2. Due to the low severity no fix was released at
that time for OpenSSL 1.1.0. The fix is now available in OpenSSL 1.1.0h.

There is an overflow bug in the AVX2 Montgomery multiplication procedure
used in exponentiation with 1024-bit moduli. No EC algorithms are affected.
Analysis suggests that attacks against RSA and DSA as a result of this defect
would be very difficult to perform and are not believed likely. Attacks
against DH1024 are considered just feasible, because most of the work
necessary to deduce information about a private key may be performed offline.
The amount of resources required for such an attack would be significant.
However, for an attack on TLS to be meaningful, the server would have to share
the DH1024 private key among multiple clients, which is no longer an option
since CVE-2016-0701.

This only affects processors that support the AVX2 but not ADX extensions
like Intel Haswell (4th generation).

Logged
Pages: [1]   Go Up
 

Sitemap 1 2 3 4 5 6 7 8 9 10 11 12 13