lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue Mar 14 08:37:35 2006
From: joey at infodrom.org (Martin Schulze)
Subject: [SECURITY] [DSA 1000-1] New Apache2::Request
	packages fix denial of service

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1000-1                    security@...ian.org
http://www.debian.org/security/                             Martin Schulze
March 14th, 2006                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : libapreq2-perl
Vulnerability  : design error
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2006-0042
BugTraq ID     : 16710
Debian Bug     : 354060

An algorithm weakness has been discovered in Apache2::Request, the
generic request library for Apache2 which can be exploited remotely
and cause a denial of service via CPU consumption.

The old stable distribution (woody) does not contain this package.

For the stable distribution (sarge) this problem has been fixed in
version 2.04-dev-1sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 2.07-1.

We recommend that you upgrade your libapreq2, libapache2-mod-apreq2
and libapache2-request-perl packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapreq2-perl_2.04-dev-1sarge1.dsc
      Size/MD5 checksum:      840 e05f06bbcf0a77fd8f91375ff92e6330
    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapreq2-perl_2.04-dev-1sarge1.diff.gz
      Size/MD5 checksum:    21273 583cae5823d1013ac0363a8d1e0953b8
    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapreq2-perl_2.04-dev.orig.tar.gz
      Size/MD5 checksum:   592748 1f5dd762c877b716f3774d502f575196

  Alpha architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_alpha.deb
      Size/MD5 checksum:   237880 c41519d07f33192e0f7f1bb4b00f56b9

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_amd64.deb
      Size/MD5 checksum:   218974 58192c2df5518b05589680a15839bf99

  ARM architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_arm.deb
      Size/MD5 checksum:   214924 2156f22e32f2503b39de86713ab706d9

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_i386.deb
      Size/MD5 checksum:   215826 7cc67ca5f23ceb25e161e480c726525d

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_ia64.deb
      Size/MD5 checksum:   259570 b18239c048dd4211c1d5ebb3fe5b3243

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_hppa.deb
      Size/MD5 checksum:   234912 6db855381435b2a28c8852743b16bf5c

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_m68k.deb
      Size/MD5 checksum:   204986 089018663ca222d6dafdf1430056621d

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_mips.deb
      Size/MD5 checksum:   215360 327d3b1ab50fddc3f45868e8c997b718

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_mipsel.deb
      Size/MD5 checksum:   215564 16ec45c84a2871de52bab87fc1742bd0

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_powerpc.deb
      Size/MD5 checksum:   227382 f64f463245ec1600abf4f2fc4afaca86

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_s390.deb
      Size/MD5 checksum:   220808 df74fab8fdab7369aa71eab1c38e2c75

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge1_sparc.deb
      Size/MD5 checksum:   215054 4c2a6b678df521cb5395d463476eba7a


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEFoCsW5ql+IAeqTIRAlbNAJ9YCp/mdZq2FLPXF/zLSH7p3MwcZQCeNnKB
v5CyvoROPWhTzX5ZLdcmuoQ=
=5fKu
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ