Debian: New squid packages fix regression
Summary
- --------------------------------------------------------------------------Debian Security Advisory DSA 809-3 security@debian.org http://www.debian.org/security/ Martin Schulze November 7th, 2005 http://www.debian.org/security/faq - --------------------------------------------------------------------------Package : squid Vulnerability : assertion error Problem type : remote Debian-specific: no CVE ID : CAN-2005-2794 Debian Bug : 320035 Kosa Attila discovered that the security update DSA 809-2 contained a regression in the packages for the old stable distribution (woody). The orginal advisory text follows: Certain aborted requests that trigger an assertion in squid, the popular WWW proxy cache, may allow remote attackers to cause a denial of service. This update also fixes a regression caused by DSA 751. For the oldstable distribution (woody) this problem has been fixed in version 2.4.6-2woody11. We recommend that you upgrade your squid package. Upgrade Instructions - --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: Size/MD5 checksum: 614 341d5ba1daa6d5b4c997096a4116c782 Size/MD5 checksum: 257997 65e0a384bde2fdb61d215b86b421b1be Size/MD5 checksum: 1081920 59ce2c58da189626d77e27b9702ca228 Alpha architecture: Size/MD5 checksum: 817194 c9b35cf30db2598f1fe8c5a4b5d842dd Size/MD5 checksum: 76148 f9310bc22c747405959b1a548765f48e Size/MD5 checksum: 60940 a3032f47551bfc3a53623631f2fda3f1 ARM architecture: Size/MD5 checksum: 727402 3cb96a5aa6b00203ea2f8ca447ff21ae Size/MD5 checksum: 73928 2dc73eb6c00e423056ea6fccf7ef0855 Size/MD5 checksum: 59250 6d4a9adeffca56d10026dd775ea1766c Intel IA-32 architecture: Size/MD5 checksum: 685502 0ac74ef690c17e054f7c1d9a0319d7de Size/MD5 checksum: 74448 873b78ff72c7bf4dd6497228a50fe3f5 Size/MD5 checksum: 58946 fcd7e84899b7e0cc7b5290899f9b95ec Intel IA-64 architecture: Size/MD5 checksum: 955144 956ca54bbec7ee77f4e53f62f5078bd0 Size/MD5 checksum: 79996 6bba69eaedc04ccacc73191750eb65bc Size/MD5 checksum: 63612 12d098851265c912a45c20fb66528bf6 HP Precision architecture: Size/MD5 checksum: 780488 8eae73112548261c5d9cb52c39468c73 Size/MD5 checksum: 75376 6a9c3c90ab04d5594387c07f1086f3f6 Size/MD5 checksum: 60400 7b0c999f8016a93fa2c804003e8997ba Motorola 680x0 architecture: Size/MD5 checksum: 667508 37917b970bd277c5e33d44aa7193d4e1 Size/MD5 checksum: 73258 9de2cd08019e7fdd6ab5ed9e4fd191b0 Size/MD5 checksum: 58474 020cf4dc54f33b326c7a3b8b17b11ae5 Big endian MIPS architecture: Size/MD5 checksum: 766382 01a6964d987a57eb7066f8d2fc7d9f60 Size/MD5 checksum: 74874 1c7e8a86b012880d7995cd9f14f86815 Size/MD5 checksum: 59544 82025d0826276e2e439fcec45490c5d7 Little endian MIPS architecture: Size/MD5 checksum: 767106 306855c183e3b34c0d329c020c1afceb Size/MD5 checksum: 74960 8261559dc2ac4aa803711db4ecf08657 Size/MD5 checksum: 59616 5d49f5eb3b7686d58e1cdc7f5cc783e9 PowerPC architecture: Size/MD5 checksum: 724312 060818b003b05f21bec0411b14b8f629 Size/MD5 checksum: 73928 f2801b6161fc1709ec3198a0d68c6560 Size/MD5 checksum: 59136 3d87426bb6d775aeef02cfc0f782f4cf IBM S/390 architecture: Size/MD5 checksum: 713394 17e4f9e7c223ad452d770925643f1e8c Size/MD5 checksum: 74254 290cf064e45db12f456ffc18d7de0edf Size/MD5 checksum: 59680 19221bca088e9ce1d68bb4c65db9ca00 Sun Sparc architecture: Size/MD5 checksum: 725552 cde8744e9e40f33aa8b9f6b8942c314a Size/MD5 checksum: 76542 e2ed6f1f3612fbdc5c203195e060c68d Size/MD5 checksum: 61558 56204ea6db0a0342920f8381e07df3ae - ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.