Debian Security Advisory DSA 452-1                     security@debian.org 
Debian -- Security Information                              Matt Zimmerman
February 29th, 2004                      Debian -- Debian security FAQ 
- --------------------------------------------------------------------------

Package        : libapache-mod-python
Vulnerability  : denial of service
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2003-0973
Debian bug     : 222828

The Apache Software Foundation announced that some versions of
mod_python contain a bug which, when processing a request with a
malformed query string, could cause the corresponding Apache child to
crash.  This bug could be exploited by a remote attacker to cause a
denial of service.

For the current stable distribution (woody) this problem has been
fixed in version 2:2.7.8-0.0woody2.

For the unstable distribution (sid), this problem has been fixed in
version 2:2.7.10-1.

We recommend that you update your libapache-mod-python package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

      
      Size/MD5 checksum:      715 3f6bd19f154109251e7ee9b8db73ebfb
      
      Size/MD5 checksum:     7564 bad7102a98f242d28ff3736e4e971fe5
      
      Size/MD5 checksum:   176639 4d5bee8317bfb45a3bb09f02b435e917

  Alpha architecture:

      
      Size/MD5 checksum:   120032 20e1ba89516235ec67df12f8a0236198

  ARM architecture:

      
      Size/MD5 checksum:   117906 64b6fbcbe483dc388f5cb4e75fa63610

  Intel IA-32 architecture:

      
      Size/MD5 checksum:   117296 e2ab69380e7e9451ab454605cb1d3e34

  Intel IA-64 architecture:

      
      Size/MD5 checksum:   131076 cea1f9dca578ba7e4cac7a7bc8638829

  HP Precision architecture:

      
      Size/MD5 checksum:   119784 fcfe4d4ddbdbf29255a51eee77c10422

  Motorola 680x0 architecture:

      
      Size/MD5 checksum:   118270 dff9473d327a981959831c9a08a48053

  Big endian MIPS architecture:

      
      Size/MD5 checksum:   117288 0d51ab71f85b5d93b23f593be4e8e7e6

  Little endian MIPS architecture:

      
      Size/MD5 checksum:   117018 52d9bca3ae178e68ef20b64dfb6b96a9

  PowerPC architecture:

      
      Size/MD5 checksum:   118232 6a42f9f8f923837788b586c711a6fa6b

  IBM S/390 architecture:

      
      Size/MD5 checksum:   119002 f13e42b816e93b5c6533df6b8c0aa597

  Sun Sparc architecture:

      
      Size/MD5 checksum:   118176 23da855358f4b8cff799a9478c8e2d81

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/

Debian: libapache-mod-python Denial of service vulnerability

March 1, 2004
Fixes a bug which allows a malformed query string to crash the corresponding Apache child process.

Summary

The Apache Software Foundation announced that some versions of
mod_python contain a bug which, when processing a request with a
malformed query string, could cause the corresponding Apache child to
crash. This bug could be exploited by a remote attacker to cause a
denial of service.

For the current stable distribution (woody) this problem has been
fixed in version 2:2.7.8-0.0woody2.

For the unstable distribution (sid), this problem has been fixed in
version 2:2.7.10-1.

We recommend that you update your libapache-mod-python package.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody

Source archives:


Size/MD5 checksum: 715 3f6bd19f154109251e7ee9b8db73ebfb

Size/MD5 checksum: 7564 bad7102a98f242d28ff3736e4e971fe5

Size/MD5 checksum: 176639 4d5bee8317bfb45a3bb09f02b435e917

Alpha architecture:


Size/MD5 checksum: 120032 20e1ba89516235ec67df12f8a0236198

ARM architecture:


Size/MD5 checksum: 117906 64b6fbcbe483dc388f5cb4e75fa63610

Intel IA-32 architecture:


Size/MD5 checksum: 117296 e2ab69380e7e9451ab454605cb1d3e34

Intel IA-64 architecture:


Size/MD5 checksum: 131076 cea1f9dca578ba7e4cac7a7bc8638829

HP Precision architecture:


Size/MD5 checksum: 119784 fcfe4d4ddbdbf29255a51eee77c10422

Motorola 680x0 architecture:


Size/MD5 checksum: 118270 dff9473d327a981959831c9a08a48053

Big endian MIPS architecture:


Size/MD5 checksum: 117288 0d51ab71f85b5d93b23f593be4e8e7e6

Little endian MIPS architecture:


Size/MD5 checksum: 117018 52d9bca3ae178e68ef20b64dfb6b96a9

PowerPC architecture:


Size/MD5 checksum: 118232 6a42f9f8f923837788b586c711a6fa6b

IBM S/390 architecture:


Size/MD5 checksum: 119002 f13e42b816e93b5c6533df6b8c0aa597

Sun Sparc architecture:


Size/MD5 checksum: 118176 23da855358f4b8cff799a9478c8e2d81

These files will probably be moved into the stable distribution on
its next revision.

For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/



Severity
Package : libapache-mod-python
Vulnerability : denial of service
Problem-Type : remote
Debian-specific: no
CVE Id : CAN-2003-0973
Debian bug : 222828

Related News