Apache 2.2.13 with Overflow Protection

Aug 11, 2009

With Apache 2.2.13, developers have closed security holes in the popular webserver.

A security bulletin reports problems concerning the Apache Portable Runtime (APR) and the Apache Portable Utility (APU). Both libraries were vulnerable to remote sources using integer overflow to launch “denial of service” attacks that could cause the application to crash. The execution of malicious code using the same external method was also a possibility.

The new version not only fixes the bug but also improves compatibility with test version 1.0.0 of OpenSSL. The changelog has a list of all changes. The
download webpage can be reached by following this link.

Related content

comments powered by Disqus

Issue 19: Linux Shell Handbook 5th Ed./Special Editions

Buy this issue as a PDF

Digital Issue: Price $15.99
(incl. VAT)

News

njobs Europe
What:
Where:
Country:
Njobs Netherlands Njobs Deutschland Njobs United Kingdom Njobs Italia Njobs France Njobs Espana Njobs Poland
Njobs Austria Njobs Denmark Njobs Belgium Njobs Czech Republic Njobs Mexico Njobs India Njobs Colombia