Httpd; Rhsa-2009:1148: Important Security Update - Red Hat ENTERPRISE LINUX 5.4 - TECHNICAL NOTES Manual

Hide thumbs Also See for ENTERPRISE LINUX 5.4 - TECHNICAL NOTES:
Table of Contents

Advertisement

Chapter 1. Package Updates
• in cases where htdig attempted to run the parser configured in the "external_parsers" attribute in the
htdig.conf configuration file, and running that parser failed, then htdig could attempt to parse its own
error messages. With this update, htdig is prevented from parsing data incorrectly in such a manner,
exits from such a situation correctly, and displays an improved error message when running the
external parser fails.
• running "htfuzzy soundex" after indexing with htdig resulted in spurious error messages when the
"allow_numbers" attribute of the htdig.conf configuration file was set to set to true.
• calling either the "htstat" or "htfuzzy" command when the database contained zero words resulted in
a segmentation fault, which has been fixed in these updated packages.
All users of htdig are advised to upgrade to these updated packages, which resolve these issues.

1.81. httpd

1.81.1. RHSA-2009:1148: Important security update

Important
This update has already been released (prior to the GA of this release) as the security
RHSA-2009:1148
errata
Updated httpd packages that fix two security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response
Team.
The Apache HTTP Server is a popular Web server.
A denial of service flaw was found in the Apache mod_proxy module when it was used as a reverse
proxy. A remote attacker could use this flaw to force a proxy process to consume large amounts of
CPU time.
(CVE-2009-1890
A denial of service flaw was found in the Apache mod_deflate module. This module continued to
compress large files until compression was complete, even if the network connection that requested
the content was closed before compression completed. This would cause mod_deflate to consume
large amounts of CPU if mod_deflate was enabled for a large file.
All httpd users should upgrade to these updated packages, which contain backported patches to
correct these issues. After installing the updated packages, the httpd daemon must be restarted for the
update to take effect.
521
https://www.redhat.com/security/data/cve/CVE-2009-1890.html
522
https://www.redhat.com/security/data/cve/CVE-2009-1891.html
86
520
521
)
522
(CVE-2009-1891
)

Advertisement

Table of Contents
loading

Table of Contents