Linux Security
Linux Security
Linux Security

Debian: New lighttpd packages fix regression

Date 23 Jul 2008
Posted By LinuxSecurity Advisories
It was discovered that lighttpd, a fast webserver with minimal memory footprint, was didn't correctly handle SSL errors. This could allow a remote attacker to disconnect all active SSL connections.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1540-3                  This email address is being protected from spambots. You need JavaScript enabled to view it.                          Thijs Kinkhorst
July 23, 2008               
- ------------------------------------------------------------------------

Package        : lighttpd
Vulnerability  : denial of service
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-1531

This update fixes a regression in lighttpd introduced in DSA-1540,
causing SSL failures. For reference the original advisory text is
quoted below.

It was discovered that lighttpd, a fast webserver with minimal memory
footprint, was didn't correctly handle SSL errors.  This could allow
a remote attacker to disconnect all active SSL connections.

For the stable distribution (etch), this problem has been fixed in
version 1.4.13-4etch10.

We recommend that you upgrade your lighttpd package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:
    Size/MD5 checksum:    36023 5421eda86388cddf30348ee39c8b2059
    Size/MD5 checksum:   793309 3a64323b8482b0e8a6246dbfdb4c39dc
    Size/MD5 checksum:     1392 6011ac4224ab8ff0c1c9355f30ab11a9

Architecture independent packages:
    Size/MD5 checksum:   100096 416759ae3a223ab799bbc7b264329600

alpha architecture (DEC Alpha)
    Size/MD5 checksum:   319874 0b138412935fb92f57bf968d075a05c1
    Size/MD5 checksum:    64968 5357d1c9aad4f5f5c03016d708670164
    Size/MD5 checksum:    65408 03933a616584ab63c0e59e652856b99c
    Size/MD5 checksum:    60148 8ed6ab0f02706ba339813f160cac356d
    Size/MD5 checksum:    61924 7171b0c3a9542b33a73b38e9b2ac516d
    Size/MD5 checksum:    71890 3d4973ba1c5e8d4938a35f7247e1cdbf

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:    70182 7ab5aa294cc9a9949ec81c850dddafee
    Size/MD5 checksum:    60978 961bc12a093309e50684188b2e948461
    Size/MD5 checksum:    64116 c745249a7e7e42d0abdd3c7761ffb086
    Size/MD5 checksum:    59368 aceae8b5e32229cf22de3d3b34344ba9
    Size/MD5 checksum:   297762 f6cf537e673702bc7f801a697368a5bc
    Size/MD5 checksum:    63822 9345b068868eb6209ec440d58ce86c55

arm architecture (ARM)
    Size/MD5 checksum:   286920 d13637f537de06b137194407064ac0a9
    Size/MD5 checksum:    69928 a3f8604454dcdd7c7b8ae9f11302e833
    Size/MD5 checksum:    61044 773180da5b9fc10d1d9d2dd414249ff5
    Size/MD5 checksum:    58916 c794ba700e98dacb27bab69f64c9e149
    Size/MD5 checksum:    63308 5e657e92c3da9916dbbaee9c4a03f018
    Size/MD5 checksum:    63104 08e2941228b962c26c3a32bf0e86d32a

hppa architecture (HP PA RISC)
    Size/MD5 checksum:    60160 69f1cd388dd12927944a18bc13ac2bfd
    Size/MD5 checksum:    65266 01e1a4431148a150b7f9d8a7686c00f2
    Size/MD5 checksum:    62150 0330b4725c3f6d0c3cd75c52d568a555
    Size/MD5 checksum:    65772 cd104584c07c3a20e476c4ab2bc16031
    Size/MD5 checksum:    73212 53e4b9752c555a2fd0b415d37f62c3f0
    Size/MD5 checksum:   324330 2d95d0da6c2b87dbf0b985eb1ab8f807

i386 architecture (Intel ia32)
    Size/MD5 checksum:   285396 caed89abf2b41aa96f854f391eeab7dd
    Size/MD5 checksum:    64088 8747d075d8b21d458e54cd08fa7e02b1
    Size/MD5 checksum:    59226 71056ae49ca30f121a53196e801a6909
    Size/MD5 checksum:    60962 a5f38b66f5375006217d89e7dd0290be
    Size/MD5 checksum:    63880 f5d9d6d0df4bde78a971363fcd91bd2e
    Size/MD5 checksum:    71204 4b26fd15200ef37037762c2f48d58ca1

ia64 architecture (Intel ia64)
    Size/MD5 checksum:    61422 0c2d54f7b9b8aa11899ef4a3e312690e
    Size/MD5 checksum:    63300 8fbe3eb055b99f3834b2dfb58f7ff070
    Size/MD5 checksum:    67756 a5c0845befc3de72d9e2289e90384f64
    Size/MD5 checksum:    77322 091bff45fac447c7bd5288c6cdf56b20
    Size/MD5 checksum:    67606 b1325f224d1b54eb65f2125e98e82424
    Size/MD5 checksum:   403688 ae0e8104305b96517d08f5aea77a4606

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:    60232 724ec494cc69548b8890880b7d248dba
    Size/MD5 checksum:    58848 3a6d7d458cb1c949115d3ad12d562138
    Size/MD5 checksum:    62926 193df4731bdc1ee1073714abe1d29114
    Size/MD5 checksum:    62800 e4c88318acfbe7f050ea4f1ed4681ebb
    Size/MD5 checksum:    69510 3f5b26527058dd16c4655c0ecde35512
    Size/MD5 checksum:   296630 75f466488f83f207f40e6f4f5f46574e

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:    61016 abe2b0c52a6296920a2e2fce95349202
    Size/MD5 checksum:   297784 e8a0ff63ef6a03ac95cf7c40b8e1b430
    Size/MD5 checksum:    59536 76c9889ec0027e00d9afe83d092d0d83
    Size/MD5 checksum:    63806 7b2d63f55b325ea9a1412a1c570dd3a3
    Size/MD5 checksum:    70284 be38504e52300160c540dc6bcd41430e
    Size/MD5 checksum:    63632 9ab20f0ac90dec49e4821bf2e3f2e352

powerpc architecture (PowerPC)
    Size/MD5 checksum:    65662 914158dc357223cfbcdf4d8dccaa0750
    Size/MD5 checksum:   324318 ed2ab4940c84fa3d7f1a50f713a4f2a9
    Size/MD5 checksum:    65382 895629ee1afc700d0df7977329708327
    Size/MD5 checksum:    60898 b93e6ec96fc740ee8d5c41f42cf61775
    Size/MD5 checksum:    62720 ddfda8e2b596cc362e13374f0b3184c0
    Size/MD5 checksum:    72022 c36a5c17592f362d264da046c86719f4

s390 architecture (IBM S/390)
    Size/MD5 checksum:    59834 b3b2274d0693571453277e07b007d317
    Size/MD5 checksum:   307604 efdcb28b7c72dd651fbef3cd29c0b2b0
    Size/MD5 checksum:    64888 5ee5c58eb8137e16d7cc5a5051e1e681
    Size/MD5 checksum:    61336 97649501fee31f896dbf0a04bc557e67
    Size/MD5 checksum:    64498 d808433a519c3b935e3377be7fe3200b
    Size/MD5 checksum:    71628 b3157f215944ad2e823bfe3faa0d1850

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:    70228 f5e3eaf4c778339568a0e5a4b50a2c71
    Size/MD5 checksum:    60764 d994ef00d45e45df2903629946c0b631
    Size/MD5 checksum:    63660 5b044502ef80613f1cd9a713ac4cf90c
    Size/MD5 checksum:   284744 a56972a3ea97aa4189ada9abec79a4be
    Size/MD5 checksum:    59114 db674bf22be34eead049277cc5882d66
    Size/MD5 checksum:    63682 2b3f4d7c52fe9cc8c9122df0bd46f7c3

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"42","type":"x","order":"1","pct":84,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.