Witam

Wykryto buga w mod_ssl < 2.8.18-1.3.31.

Vulnerability:       arbitrary code execution  
Description:                                                                           
             
  Georgi Guninski discovered [1] a stack-based buffer overflow in                      
             
  the "SSLOptions +FakeBasicAuth" implementation of Apache's SSL/TLS                   
             
  extension module mod_ssl [0]. The overflow can occur if the Subject-DN               
             
  in the client certificate exceeds 6KB in length and mod_ssl is
  configured to trust the issuing CA. The Common Vulnerabilities and                   
             
  Exposures (CVE) project assigned the id CAN-2004-0488 [2] to the                     
             
  problem.                                                                             
            

Zaktualizowałem na HEAD i RA-branch. Proszę o puszczenie na buildery
i umieszenia na ftp ASAP. 
                                                                                
-- 
Arkadiusz Patyk [areq(at)pld-linux.org] [http://rescuecd.pld-linux.org]
[IRC:areq ICQ:16231667  GG:1383]  [AP3-6BONE] [AP14126-RIPE]

_______________________________________________________
złota zasada - kto się nie zna, niech się nie wypowiada

Odpowiedź listem elektroniczym