Subject: | |
From: | |
Reply To: | |
Date: | Wed, 1 Jun 2011 11:42:59 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Low: apr security update
Issue Date: 2011-05-31
CVE Numbers: CVE-2011-1928
The Apache Portable Runtime (APR) is a portability library used by the
Apache HTTP Server and other projects. It provides a free library of C
data structures and routines.
The fix for CVE-2011-0419 introduced an infinite loop flaw in the
apr_fnmatch() function when the APR_FNM_PATHNAME matching flag was used.
A remote attacker could possibly use this flaw to cause a denial of
service on an application using the apr_fnmatch() function. (CVE-2011-1928)
Note: This problem affected httpd configurations using the "Location"
directive with wildcard URLs. The denial of service could have been
triggered during normal operation; it did not specifically require a
malicious HTTP request.
This update also addresses additional problems introduced by the rewrite
of the apr_fnmatch() function, which was necessary to address the
CVE-2011-0419 flaw.
All apr users should upgrade to these updated packages, which contain a
backported patch to correct this issue. Applications using the apr
library, such as httpd, must be restarted for this update to take effect.
SL4:
x86_64
apr-0.9.4-26.el4.x86_64.rpm
apr-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-devel-0.9.4-26.el4.x86_64.rpm
apr-debuginfo-0.9.4-26.el4.x86_64.rpm
i386
apr-0.9.4-26.el4.i386.rpm
apr-devel-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
SL5:
x86_64
apr-debuginfo-1.2.7-11.el5_6.5.i386.rpm
apr-debuginfo-1.2.7-11.el5_6.5.x86_64.rpm
apr-devel-1.2.7-11.el5_6.5.i386.rpm
apr-devel-1.2.7-11.el5_6.5.x86_64.rpm
apr-docs-1.2.7-11.el5_6.5.x86_64.rpm
apr-1.2.7-11.el5_6.5.x86_64.rpm
apr-1.2.7-11.el5_6.5.i386.rpm
i386
apr-docs-1.2.7-11.el5_6.5.i386.rpm
apr-devel-1.2.7-11.el5_6.5.i386.rpm
apr-1.2.7-11.el5_6.5.i386.rpm
apr-debuginfo-1.2.7-11.el5_6.5.i386.rpm
- Scientific Linux Development Team
|
|
|