Synopsis:	Moderate: apr security update
Issue date:	2011-05-11
CVE Names:	CVE-2011-0419

It was discovered that the apr_fnmatch() function used an unconstrained
recursion when processing patterns with the '*' wildcard. An attacker 
could use this flaw to cause an application using this function, which 
also accepted untrusted input as a pattern for matching (such as an 
httpd server using the mod_autoindex module), to exhaust all stack 
memory or use an excessive amount of CPU time when performing matching. 
(CVE-2011-0419)

Applications using the apr library, such as httpd, must be restarted for 
this update to take effect.

SL 4.x

        SRPMS:
apr-0.9.4-25.el4.src.rpm
        i386:
apr-0.9.4-25.el4.i386.rpm
apr-devel-0.9.4-25.el4.i386.rpm
        x86_64:
apr-0.9.4-25.el4.i386.rpm
apr-0.9.4-25.el4.x86_64.rpm
apr-devel-0.9.4-25.el4.x86_64.rpm

SL 5.x

        SRPMS:
apr-1.2.7-11.el5_6.4.src.rpm
        i386:
apr-1.2.7-11.el5_6.4.i386.rpm
apr-devel-1.2.7-11.el5_6.4.i386.rpm
apr-docs-1.2.7-11.el5_6.4.i386.rpm
        x86_64:
apr-1.2.7-11.el5_6.4.i386.rpm
apr-1.2.7-11.el5_6.4.x86_64.rpm
apr-devel-1.2.7-11.el5_6.4.i386.rpm
apr-devel-1.2.7-11.el5_6.4.x86_64.rpm
apr-docs-1.2.7-11.el5_6.4.x86_64.rpm

SL 6.x

        SRPMS:
apr-1.3.9-3.el6_0.1.src.rpm
        i386:
apr-1.3.9-3.el6_0.1.i686.rpm
apr-devel-1.3.9-3.el6_0.1.i686.rpm
        x86_64:
apr-1.3.9-3.el6_0.1.i686.rpm
apr-1.3.9-3.el6_0.1.x86_64.rpm
apr-devel-1.3.9-3.el6_0.1.i686.rpm
apr-devel-1.3.9-3.el6_0.1.x86_64.rpm

- Scientific Linux Development Team