Debian: DSA-3253-1: pound security update

    Date07 May 2015
    CategoryDebian
    91
    Posted ByLinuxSecurity Advisories
    Pound, a HTTP reverse proxy and load balancer, had several issues related to vulnerabilities in the Secure Sockets Layer (SSL) protocol. For Debian 7 (wheezy) this update adds a missing part to make it
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3253-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                           Thijs Kinkhorst
    May 07, 2015                           http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : pound
    CVE ID         : CVE-2009-3555 CVE-2012-4929 CVE-2014-3566
    Debian Bug     : 723731 727197 765539 765649
    
    Pound, a HTTP reverse proxy and load balancer, had several issues
    related to vulnerabilities in the Secure Sockets Layer (SSL) protocol.
    
    For Debian 7 (wheezy) this update adds a missing part to make it
    actually possible to disable client-initiated renegotiation and
    disables it by default (CVE-2009-3555). TLS compression is disabled
    (CVE-2012-4929), although this is normally already disabled by the OpenSSL
    system library. Finally it adds the ability to disable the SSLv3 protocol
    (CVE-2014-3566) entirely via the new "DisableSSLv3" configuration
    directive, although it will not disabled by default in this update.
    Additionally a non-security sensitive issue in redirect encoding is
    addressed.
    
    For Debian 8 (jessie) these issues have been fixed prior to the release,
    with the exception of client-initiated renegotiation (CVE-2009-3555).
    This update addresses that issue for jessie.
    
    For the oldstable distribution (wheezy), these problems have been fixed
    in version 2.6-2+deb7u1.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 2.6-6+deb8u1.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 2.6-6.1.
    
    We recommend that you upgrade your pound packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.