- --------------------------------------------------------------------------
Debian-Edu/Skolelinux Security Advisory DESA 2004-007
http://www.skolelinux.no/security/ Finn-Arne Johansen
June 29th, 2004 debian-edu-security@lists.alioth.debian.org
- --------------------------------------------------------------------------
Package : apache
Vulnerability : buffer overflow
Problem-Type : remote
Need reboot : no
Debian-Edu-specific : no
CVE ID : CAN-2004-0492
DSA ID : DSA 525-1
Georgi Guninski discovered a buffer overflow bug in Apache's mod_proxy
module. This is not used by default in a Debian-edu setup, but we urge
you to upgraded nonetheless. For a more detailed description, take a look
at the Debian Security Advisory which describes the same vulnerabilities:
http://www.debian.org/security/2004/dsa-525
New packages are availible from http://security.debian.org.
We recommend that you upgrade your apache package.
Upgrade Instructions
- --------------------
Make sure 'deb htts://security.debian.org/ stable/updates main
present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists.
apt-get install apache
- --------------------------------------------------------------------------
Mailing list: bruker@skolelinux.no, debian-edu@lists.debian.org,
linuxiskolen@skolelinux.no
Package info: `apt-cache show <pkg>'
Attachment:
signature.asc
Description: Digital signature