Subject: | |
From: | |
Reply To: | |
Date: | Thu, 28 May 2009 07:28:48 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: httpd security update
Issue date: 2009-05-27
CVE Names: CVE-2008-1678 CVE-2009-1195
A flaw was found in the handling of compression structures between
mod_ssl and OpenSSL. If too many connections were opened in a short
period of time, all system memory and swap space would be consumed by
httpd, negatively impacting other processes, or causing a system crash.
(CVE-2008-1678)
A flaw was found in the handling of the "Options" and "AllowOverride"
directives. In configurations using the "AllowOverride" directive with
certain "Options=" arguments, local users were not restricted from
executing commands from a Server-Side-Include script as intended.
(CVE-2009-1195)
Users must restart httpd for this update to take effect.
SL 5.x
SRPMS:
httpd-2.2.3-22.sl5.1.src.rpm
i386:
httpd-2.2.3-22.sl5.1.i386.rpm
httpd-devel-2.2.3-22.sl5.1.i386.rpm
httpd-manual-2.2.3-22.sl5.1.i386.rpm
mod_ssl-2.2.3-22.sl5.1.i386.rpm
x86_64:
httpd-2.2.3-22.sl5.1.x86_64.rpm
httpd-devel-2.2.3-22.sl5.1.i386.rpm
httpd-devel-2.2.3-22.sl5.1.x86_64.rpm
httpd-manual-2.2.3-22.sl5.1.x86_64.rpm
mod_ssl-2.2.3-22.sl5.1.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|