USN-802-1: Apache vulnerabilities
13 July 2009
apache2 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 9.04
- Ubuntu 8.10
- Ubuntu 8.04 LTS
- Ubuntu 6.06 LTS
Software Description
- apache2
Details
It was discovered that mod_proxy_http did not properly handle a large amount of streamed data when used as a reverse proxy. A remote attacker could exploit this and cause a denial of service via memory resource consumption. This issue affected Ubuntu 8.04 LTS, 8.10 and 9.04. (CVE-2009-1890)
It was discovered that mod_deflate did not abort compressing large files when the connection was closed. A remote attacker could exploit this and cause a denial of service via CPU resource consumption. (CVE-2009-1891)
Update instructions
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 9.04
- apache2-mpm-event - 2.2.11-2ubuntu2.2
- apache2-mpm-prefork - 2.2.11-2ubuntu2.2
- apache2-mpm-worker - 2.2.11-2ubuntu2.2
- apache2.2-common - 2.2.11-2ubuntu2.2
- Ubuntu 8.10
- apache2-mpm-event - 2.2.9-7ubuntu3.2
- apache2-mpm-prefork - 2.2.9-7ubuntu3.2
- apache2-mpm-worker - 2.2.9-7ubuntu3.2
- apache2.2-common - 2.2.9-7ubuntu3.2
- Ubuntu 8.04 LTS
- apache2-mpm-event - 2.2.8-1ubuntu0.10
- apache2-mpm-perchild - 2.2.8-1ubuntu0.10
- apache2-mpm-prefork - 2.2.8-1ubuntu0.10
- apache2-mpm-worker - 2.2.8-1ubuntu0.10
- apache2.2-common - 2.2.8-1ubuntu0.10
- Ubuntu 6.06 LTS
- apache2-common - 2.0.55-4ubuntu2.6
- apache2-mpm-perchild - 2.0.55-4ubuntu2.6
- apache2-mpm-prefork - 2.0.55-4ubuntu2.6
- apache2-mpm-worker - 2.0.55-4ubuntu2.6
- libapr0 - 2.0.55-4ubuntu2.6
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system upgrade is sufficient to effect the necessary changes.