Apache httpd 2.4.59 Released (INCLUDES SECURITY FIXES)

I've read about this vulnerability (CVE-2024-27316) and was unable to understand if updating nghttp2 fixes the issue or you must update both nghttp2 and Apache...
 
It's already in the alpha build of DirectAdmin, thank you for the report, and thanks @fln for the alpha build :)
Please see below:


Something has changed, I'm no longer alone, more and more of your customers are having a failed Apache process following the update. The server SSL files are being overwritten when Apache is built (should not happen, obviously) and server.ca is being zeroed.
 
Please see below:


Something has changed, I'm no longer alone, more and more of your customers are having a failed Apache process following the update. The server SSL files are being overwritten when Apache is built (should not happen, obviously) and server.ca is being zeroed.
That is explained in your other thread and is caused by customisation. Until now I didn't hear of any others having zeroed server.ca files. Please keep that issue in that thread. It's not related to the vulnerability.

Last night I updated 5 servers and non had any issues with Apache or server.ca certificates.
 
I feel like this is an issue that underscores why tying stack application updates to DirectAdmin updates is a bad idea.

In order to get this Apache update, you have to be using the just released DirectAdmin v1.662.

But how many "fixes" does v1.662 have to go through before it's stable and fixed? The thread on these forums every time a new DirectAdmin version is released always has at least a couple of pages of issues being discovered that require hot fixes.

Perhaps DirectAdmin should consider pushing security fixes, such as this Apache fix, to a handful of the previous DirectAdmin releases. I know I can't be the only one that prefers stable (as in a DirectAdmin that doesn't have various "fixes" pushed out all the time) over a bleeding edge feature release model.
 
Back
Top