Sender: |
|
Date: |
Thu, 28 May 2009 07:28:48 -0500 |
MIME-version: |
1.0 |
Reply-To: |
|
Content-type: |
text/plain; format=flowed; charset=ISO-8859-1 |
Subject: |
|
From: |
|
Content-transfer-encoding: |
7BIT |
Comments: |
|
Parts/Attachments: |
|
|
Synopsis: Moderate: httpd security update
Issue date: 2009-05-27
CVE Names: CVE-2008-1678 CVE-2009-1195
A flaw was found in the handling of compression structures between
mod_ssl and OpenSSL. If too many connections were opened in a short
period of time, all system memory and swap space would be consumed by
httpd, negatively impacting other processes, or causing a system crash.
(CVE-2008-1678)
A flaw was found in the handling of the "Options" and "AllowOverride"
directives. In configurations using the "AllowOverride" directive with
certain "Options=" arguments, local users were not restricted from
executing commands from a Server-Side-Include script as intended.
(CVE-2009-1195)
Users must restart httpd for this update to take effect.
SL 5.x
SRPMS:
httpd-2.2.3-22.sl5.1.src.rpm
i386:
httpd-2.2.3-22.sl5.1.i386.rpm
httpd-devel-2.2.3-22.sl5.1.i386.rpm
httpd-manual-2.2.3-22.sl5.1.i386.rpm
mod_ssl-2.2.3-22.sl5.1.i386.rpm
x86_64:
httpd-2.2.3-22.sl5.1.x86_64.rpm
httpd-devel-2.2.3-22.sl5.1.i386.rpm
httpd-devel-2.2.3-22.sl5.1.x86_64.rpm
httpd-manual-2.2.3-22.sl5.1.x86_64.rpm
mod_ssl-2.2.3-22.sl5.1.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|