Apache 2.2.13 with Overflow Protection

Aug 11, 2009

With Apache 2.2.13, developers have closed security holes in the popular webserver.

A security bulletin reports problems concerning the Apache Portable Runtime (APR) and the Apache Portable Utility (APU). Both libraries were vulnerable to remote sources using integer overflow to launch “denial of service” attacks that could cause the application to crash. The execution of malicious code using the same external method was also a possibility.

The new version not only fixes the bug but also improves compatibility with test version 1.0.0 of OpenSSL. The changelog has a list of all changes. The
download webpage can be reached by following this link.

Related content

comments powered by Disqus

Issue 269/2023

Buy this issue as a PDF

Digital Issue: Price $12.99
(incl. VAT)

Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Find SysAdmin Jobs