Debian: New Apache2::Request packages fix denial of service
Posted by Benjamin D. Thomas   
Debian Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1000-1                                       Martin Schulze
March 14th, 2006              
- --------------------------------------------------------------------------

Package        : libapreq2-perl
Vulnerability  : design error
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2006-0042
BugTraq ID     : 16710
Debian Bug     : 354060

An algorithm weakness has been discovered in Apache2::Request, the
generic request library for Apache2 which can be exploited remotely
and cause a denial of service via CPU consumption.

The old stable distribution (woody) does not contain this package.

For the stable distribution (sarge) this problem has been fixed in
version 2.04-dev-1sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 2.07-1.

We recommend that you upgrade your libapreq2, libapache2-mod-apreq2
and libapache2-request-perl packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      840 e05f06bbcf0a77fd8f91375ff92e6330
      Size/MD5 checksum:    21273 583cae5823d1013ac0363a8d1e0953b8
      Size/MD5 checksum:   592748 1f5dd762c877b716f3774d502f575196

  Alpha architecture:
      Size/MD5 checksum:   237880 c41519d07f33192e0f7f1bb4b00f56b9

  AMD64 architecture:
      Size/MD5 checksum:   218974 58192c2df5518b05589680a15839bf99

  ARM architecture:
      Size/MD5 checksum:   214924 2156f22e32f2503b39de86713ab706d9

  Intel IA-32 architecture:
      Size/MD5 checksum:   215826 7cc67ca5f23ceb25e161e480c726525d

  Intel IA-64 architecture:
      Size/MD5 checksum:   259570 b18239c048dd4211c1d5ebb3fe5b3243

  HP Precision architecture:
      Size/MD5 checksum:   234912 6db855381435b2a28c8852743b16bf5c

  Motorola 680x0 architecture:
      Size/MD5 checksum:   204986 089018663ca222d6dafdf1430056621d

  Big endian MIPS architecture:
      Size/MD5 checksum:   215360 327d3b1ab50fddc3f45868e8c997b718

  Little endian MIPS architecture:
      Size/MD5 checksum:   215564 16ec45c84a2871de52bab87fc1742bd0

  PowerPC architecture:
      Size/MD5 checksum:   227382 f64f463245ec1600abf4f2fc4afaca86

  IBM S/390 architecture:
      Size/MD5 checksum:   220808 df74fab8fdab7369aa71eab1c38e2c75

  Sun Sparc architecture:
      Size/MD5 checksum:   215054 4c2a6b678df521cb5395d463476eba7a

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: