[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

DESA-2004-007 - apache: buffer overflow



- --------------------------------------------------------------------------
Debian-Edu/Skolelinux Security Advisory DESA 2004-007
http://www.skolelinux.no/security/                      Finn-Arne Johansen
June 29th, 2004                 debian-edu-security@lists.alioth.debian.org
- --------------------------------------------------------------------------

Package             : apache
Vulnerability       : buffer overflow
Problem-Type        : remote
Need reboot         : no
Debian-Edu-specific : no
CVE ID              : CAN-2004-0492
DSA ID              : DSA 525-1

Georgi Guninski discovered a buffer overflow bug in Apache's mod_proxy
module. This is not used by default in a Debian-edu setup, but we urge
you to upgraded nonetheless. For  a more detailed description, take a look
at the Debian Security Advisory which describes the same vulnerabilities:

  http://www.debian.org/security/2004/dsa-525

New packages are availible from http://security.debian.org. 

We recommend that you upgrade your apache package.


Upgrade Instructions
- --------------------

Make sure 'deb htts://security.debian.org/ stable/updates main
present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists.

  apt-get install apache

- --------------------------------------------------------------------------
Mailing list: bruker@skolelinux.no, debian-edu@lists.debian.org,
              linuxiskolen@skolelinux.no
Package info: `apt-cache show <pkg>'

Attachment: signature.asc
Description: Digital signature


Reply to: