[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] New versions of apache fixes denial of services

We have received a report from Dag-Erling Coidan Smørgrav who says
that the apache as distributed with Debian GNU/Linux 2.0 is vulnerable
to a denial of services exploit, where repeated, identical headers
can consume O(n^2) memory.

We recommend you upgrade your apache package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.0 alias hamm

  This version of Debian was released only for the Intel and the
  Motorola 68xxx architecture.

      MD5 checksum: ce19f3993e469bd862c6160ba2809ed9
      MD5 checksum: e8fc0dd9660fc17ba7423ae2235e9463
      MD5 checksum: 0470ab9f66a70b3ad4745a902983be7c

  Intel architecture:
      MD5 checksum: 3b3741bbf86e104babecffbc658203dd

  Motorola 68xxx architecture:
      MD5 checksum: 9187faca2e84f5b43439b29d814c7fe3

  These files will be moved into
  ftp://ftp.debian.org/debian/dists/hamm/*/binary-$arch/ soon.

For other architectures please refer to the appropriate directory
ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

Debian GNU/Linux    .    Security Managers    .    security@debian.org
Christian Hudon <chrish@debian.org> . Martin Schulze <joey@debian.org>

Attachment: pgpKSU7fHy10B.pgp
Description: PGP signature

Reply to: