Synopsis: Moderate: apr security update Issue date: 2011-05-11 CVE Names: CVE-2011-0419 It was discovered that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching. (CVE-2011-0419) Applications using the apr library, such as httpd, must be restarted for this update to take effect. SL 4.x SRPMS: apr-0.9.4-25.el4.src.rpm i386: apr-0.9.4-25.el4.i386.rpm apr-devel-0.9.4-25.el4.i386.rpm x86_64: apr-0.9.4-25.el4.i386.rpm apr-0.9.4-25.el4.x86_64.rpm apr-devel-0.9.4-25.el4.x86_64.rpm SL 5.x SRPMS: apr-1.2.7-11.el5_6.4.src.rpm i386: apr-1.2.7-11.el5_6.4.i386.rpm apr-devel-1.2.7-11.el5_6.4.i386.rpm apr-docs-1.2.7-11.el5_6.4.i386.rpm x86_64: apr-1.2.7-11.el5_6.4.i386.rpm apr-1.2.7-11.el5_6.4.x86_64.rpm apr-devel-1.2.7-11.el5_6.4.i386.rpm apr-devel-1.2.7-11.el5_6.4.x86_64.rpm apr-docs-1.2.7-11.el5_6.4.x86_64.rpm SL 6.x SRPMS: apr-1.3.9-3.el6_0.1.src.rpm i386: apr-1.3.9-3.el6_0.1.i686.rpm apr-devel-1.3.9-3.el6_0.1.i686.rpm x86_64: apr-1.3.9-3.el6_0.1.i686.rpm apr-1.3.9-3.el6_0.1.x86_64.rpm apr-devel-1.3.9-3.el6_0.1.i686.rpm apr-devel-1.3.9-3.el6_0.1.x86_64.rpm - Scientific Linux Development Team