- --------------------------------------------------------------------------Debian Security Advisory DSA 1000-1                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
March 14th, 2006                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------Package        : libapreq2-perl
Vulnerability  : design error
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2006-0042
BugTraq ID     : 16710
Debian Bug     : 354060

An algorithm weakness has been discovered in Apache2::Request, the
generic request library for Apache2 which can be exploited remotely
and cause a denial of service via CPU consumption.

The old stable distribution (woody) does not contain this package.

For the stable distribution (sarge) this problem has been fixed in
version 2.04-dev-1sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 2.07-1.

We recommend that you upgrade your libapreq2, libapache2-mod-apreq2
and libapache2-request-perl packages.


Upgrade Instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------  Source archives:

          Size/MD5 checksum:      840 e05f06bbcf0a77fd8f91375ff92e6330
          Size/MD5 checksum:    21273 583cae5823d1013ac0363a8d1e0953b8
          Size/MD5 checksum:   592748 1f5dd762c877b716f3774d502f575196

  Alpha architecture:

          Size/MD5 checksum:   237880 c41519d07f33192e0f7f1bb4b00f56b9

  AMD64 architecture:

          Size/MD5 checksum:   218974 58192c2df5518b05589680a15839bf99

  ARM architecture:

          Size/MD5 checksum:   214924 2156f22e32f2503b39de86713ab706d9

  Intel IA-32 architecture:

          Size/MD5 checksum:   215826 7cc67ca5f23ceb25e161e480c726525d

  Intel IA-64 architecture:

          Size/MD5 checksum:   259570 b18239c048dd4211c1d5ebb3fe5b3243

  HP Precision architecture:

          Size/MD5 checksum:   234912 6db855381435b2a28c8852743b16bf5c

  Motorola 680x0 architecture:

          Size/MD5 checksum:   204986 089018663ca222d6dafdf1430056621d

  Big endian MIPS architecture:

          Size/MD5 checksum:   215360 327d3b1ab50fddc3f45868e8c997b718

  Little endian MIPS architecture:

          Size/MD5 checksum:   215564 16ec45c84a2871de52bab87fc1742bd0

  PowerPC architecture:

          Size/MD5 checksum:   227382 f64f463245ec1600abf4f2fc4afaca86

  IBM S/390 architecture:

          Size/MD5 checksum:   220808 df74fab8fdab7369aa71eab1c38e2c75

  Sun Sparc architecture:

          Size/MD5 checksum:   215054 4c2a6b678df521cb5395d463476eba7a


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: Apache2::Request fix denial of service DSA-1000-1

March 14, 2006
Updated package.

Summary

Severity

Related News