httpd, mod_ssl security update

2007-07-13T09:59:54
ID CESA-2007:0662
Type centos
Reporter CentOS Project
Modified 2007-07-15T11:29:09

Description

CentOS Errata and Security Advisory CESA-2007:0662

The Apache HTTP Server is a popular Web server.

The Apache HTTP Server did not verify that a process was an Apache child process before sending it signals. A local attacker with the ability to run scripts on the Apache HTTP Server could manipulate the scoreboard and cause arbitrary processes to be terminated which could lead to a denial of service. (CVE-2007-3304).

Users of httpd should upgrade to these updated packages, which contain backported patches to correct this issue. Users should restart Apache after installing this update.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2007-July/026071.html http://lists.centos.org/pipermail/centos-announce/2007-July/026072.html http://lists.centos.org/pipermail/centos-announce/2007-July/026074.html http://lists.centos.org/pipermail/centos-announce/2007-July/026075.html http://lists.centos.org/pipermail/centos-announce/2007-July/026080.html http://lists.centos.org/pipermail/centos-announce/2007-July/026081.html http://lists.centos.org/pipermail/centos-announce/2007-July/026082.html http://lists.centos.org/pipermail/centos-announce/2007-July/026083.html

Affected packages: httpd httpd-devel httpd-manual httpd-suexec mod_ssl

Upstream details at: https://rhn.redhat.com/errata/RHSA-2007-0662.html