First published: Thu Jul 12 2018(Updated: )
This release adds the new Apache HTTP Server 2.4.29 packages that are part<br>of the JBoss Core Services offering.<br>This release serves as a replacement for Red Hat JBoss Core Services<br>Apache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer<br>to the Release Notes for information on the most significant bug fixes,<br>enhancements and component upgrades included in this release.<br>This release upgrades OpenSSL to version 1.0.2.n<br>Security Fix(es):<br><li> openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() (CVE-2016-2182)</li> <li> openssl: Insufficient TLS session ticket HMAC length checks (CVE-2016-6302)</li> <li> openssl: certificate message OOB reads (CVE-2016-6306)</li> <li> openssl: Carry propagating bug in Montgomery multiplication (CVE-2016-7055)</li> <li> openssl: Truncated packet could crash via OOB read (CVE-2017-3731)</li> <li> openssl: BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)</li> <li> openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)</li> <li> openssl: Read/write after SSL object in error state (CVE-2017-3737)</li> <li> openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)</li> Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6306<br>and CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360<br>Inc.) as the original reporter of CVE-2016-6306.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.