Subject: | |
From: | |
Reply To: | |
Date: | Fri, 13 May 2011 15:03:06 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: apr security update
Issue date: 2011-05-11
CVE Names: CVE-2011-0419
It was discovered that the apr_fnmatch() function used an unconstrained
recursion when processing patterns with the '*' wildcard. An attacker
could use this flaw to cause an application using this function, which
also accepted untrusted input as a pattern for matching (such as an
httpd server using the mod_autoindex module), to exhaust all stack
memory or use an excessive amount of CPU time when performing matching.
(CVE-2011-0419)
Applications using the apr library, such as httpd, must be restarted for
this update to take effect.
SL 4.x
SRPMS:
apr-0.9.4-25.el4.src.rpm
i386:
apr-0.9.4-25.el4.i386.rpm
apr-devel-0.9.4-25.el4.i386.rpm
x86_64:
apr-0.9.4-25.el4.i386.rpm
apr-0.9.4-25.el4.x86_64.rpm
apr-devel-0.9.4-25.el4.x86_64.rpm
SL 5.x
SRPMS:
apr-1.2.7-11.el5_6.4.src.rpm
i386:
apr-1.2.7-11.el5_6.4.i386.rpm
apr-devel-1.2.7-11.el5_6.4.i386.rpm
apr-docs-1.2.7-11.el5_6.4.i386.rpm
x86_64:
apr-1.2.7-11.el5_6.4.i386.rpm
apr-1.2.7-11.el5_6.4.x86_64.rpm
apr-devel-1.2.7-11.el5_6.4.i386.rpm
apr-devel-1.2.7-11.el5_6.4.x86_64.rpm
apr-docs-1.2.7-11.el5_6.4.x86_64.rpm
SL 6.x
SRPMS:
apr-1.3.9-3.el6_0.1.src.rpm
i386:
apr-1.3.9-3.el6_0.1.i686.rpm
apr-devel-1.3.9-3.el6_0.1.i686.rpm
x86_64:
apr-1.3.9-3.el6_0.1.i686.rpm
apr-1.3.9-3.el6_0.1.x86_64.rpm
apr-devel-1.3.9-3.el6_0.1.i686.rpm
apr-devel-1.3.9-3.el6_0.1.x86_64.rpm
- Scientific Linux Development Team
|
|
|