Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2641-2: libapache2-mod-perl2 update related to DSA 2641-1

    Date
    113
    Posted By
    The security fix applied to the perl package due to CVE-2013-1667 introduced a test failure in libapache2-mod-perl2 source package specific to the rehash mechanism in Perl. See Debian Bug #702821 for details. This update fixes that problem. For reference, the original
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2641-2                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                      Salvatore Bonaccorso
    March 20, 2013                         https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : libapache2-mod-perl2
    Debian Bug     : 702821
    
    The security fix applied to the perl package due to CVE-2013-1667
    introduced a test failure in libapache2-mod-perl2 source package
    specific to the rehash mechanism in Perl. See Debian Bug #702821 for
    details. This update fixes that problem. For reference, the original
    advisory text for perl follows.
    
    Yves Orton discovered a flaw in the rehashing code of Perl. This flaw
    could be exploited to carry out a denial of service attack against code
    that uses arbitrary user input as hash keys. Specifically an attacker
    could create a set of keys of a hash causing a denial of service via
    memory exhaustion.
    
    For the stable distribution (squeeze), this problem has been fixed in
    version 2.0.4-7+squeeze1.
    
    For the testing distribution (wheezy) this problem has been fixed in
    version 2.0.7-3.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 2.0.7-3.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/36-have-you-ever-used-tcpdump-for-network-troubleshooting-or-debugging?task=poll.vote&format=json
    36
    radio
    [{"id":"125","title":"Yes","votes":"46","type":"x","order":"1","pct":83.64,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":16.36,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.