Lucene search

K
centosCentOS ProjectCESA-2011:0507
HistoryMay 12, 2011 - 2:38 a.m.

apr security update

2011-05-1202:38:03
CentOS Project
lists.centos.org
49

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.969 High

EPSS

Percentile

99.7%

CentOS Errata and Security Advisory CESA-2011:0507

The Apache Portable Runtime (APR) is a portability library used by the
Apache HTTP Server and other projects. It provides a free library of C data
structures and routines.

It was discovered that the apr_fnmatch() function used an unconstrained
recursion when processing patterns with the ‘*’ wildcard. An attacker could
use this flaw to cause an application using this function, which also
accepted untrusted input as a pattern for matching (such as an httpd server
using the mod_autoindex module), to exhaust all stack memory or use an
excessive amount of CPU time when performing matching. (CVE-2011-0419)

Red Hat would like to thank Maksymilian Arciemowicz for reporting this
issue.

All apr users should upgrade to these updated packages, which contain a
backported patch to correct this issue. Applications using the apr library,
such as httpd, must be restarted for this update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-May/079715.html
https://lists.centos.org/pipermail/centos-announce/2011-May/079716.html
https://lists.centos.org/pipermail/centos-announce/2011-May/079717.html
https://lists.centos.org/pipermail/centos-announce/2011-May/079718.html

Affected packages:
apr
apr-devel
apr-docs

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:0507

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.969 High

EPSS

Percentile

99.7%