Linux Security
    Linux Security
    Linux Security

    Debian: New squid packages fix regression

    Posted By
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 809-3                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    November 7th, 2005            
    - --------------------------------------------------------------------------
    Package        : squid
    Vulnerability  : assertion error
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CAN-2005-2794
    Debian Bug     : 320035
    Kosa Attila discovered that the security update DSA 809-2 contained a
    regression in the packages for the old stable distribution (woody).
    The orginal advisory text follows:
       Certain aborted requests that trigger an assertion in squid, the
       popular WWW proxy cache, may allow remote attackers to cause a
       denial of service.  This update also fixes a regression caused by
       DSA 751.
    For the oldstable distribution (woody) this problem has been fixed in
    version 2.4.6-2woody11.
    We recommend that you upgrade your squid package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      614 341d5ba1daa6d5b4c997096a4116c782
          Size/MD5 checksum:   257997 65e0a384bde2fdb61d215b86b421b1be
          Size/MD5 checksum:  1081920 59ce2c58da189626d77e27b9702ca228
      Alpha architecture:
          Size/MD5 checksum:   817194 c9b35cf30db2598f1fe8c5a4b5d842dd
          Size/MD5 checksum:    76148 f9310bc22c747405959b1a548765f48e
          Size/MD5 checksum:    60940 a3032f47551bfc3a53623631f2fda3f1
      ARM architecture:
          Size/MD5 checksum:   727402 3cb96a5aa6b00203ea2f8ca447ff21ae
          Size/MD5 checksum:    73928 2dc73eb6c00e423056ea6fccf7ef0855
          Size/MD5 checksum:    59250 6d4a9adeffca56d10026dd775ea1766c
      Intel IA-32 architecture:
          Size/MD5 checksum:   685502 0ac74ef690c17e054f7c1d9a0319d7de
          Size/MD5 checksum:    74448 873b78ff72c7bf4dd6497228a50fe3f5
          Size/MD5 checksum:    58946 fcd7e84899b7e0cc7b5290899f9b95ec
      Intel IA-64 architecture:
          Size/MD5 checksum:   955144 956ca54bbec7ee77f4e53f62f5078bd0
          Size/MD5 checksum:    79996 6bba69eaedc04ccacc73191750eb65bc
          Size/MD5 checksum:    63612 12d098851265c912a45c20fb66528bf6
      HP Precision architecture:
          Size/MD5 checksum:   780488 8eae73112548261c5d9cb52c39468c73
          Size/MD5 checksum:    75376 6a9c3c90ab04d5594387c07f1086f3f6
          Size/MD5 checksum:    60400 7b0c999f8016a93fa2c804003e8997ba
      Motorola 680x0 architecture:
          Size/MD5 checksum:   667508 37917b970bd277c5e33d44aa7193d4e1
          Size/MD5 checksum:    73258 9de2cd08019e7fdd6ab5ed9e4fd191b0
          Size/MD5 checksum:    58474 020cf4dc54f33b326c7a3b8b17b11ae5
      Big endian MIPS architecture:
          Size/MD5 checksum:   766382 01a6964d987a57eb7066f8d2fc7d9f60
          Size/MD5 checksum:    74874 1c7e8a86b012880d7995cd9f14f86815
          Size/MD5 checksum:    59544 82025d0826276e2e439fcec45490c5d7
      Little endian MIPS architecture:
          Size/MD5 checksum:   767106 306855c183e3b34c0d329c020c1afceb
          Size/MD5 checksum:    74960 8261559dc2ac4aa803711db4ecf08657
          Size/MD5 checksum:    59616 5d49f5eb3b7686d58e1cdc7f5cc783e9
      PowerPC architecture:
          Size/MD5 checksum:   724312 060818b003b05f21bec0411b14b8f629
          Size/MD5 checksum:    73928 f2801b6161fc1709ec3198a0d68c6560
          Size/MD5 checksum:    59136 3d87426bb6d775aeef02cfc0f782f4cf
      IBM S/390 architecture:
          Size/MD5 checksum:   713394 17e4f9e7c223ad452d770925643f1e8c
          Size/MD5 checksum:    74254 290cf064e45db12f456ffc18d7de0edf
          Size/MD5 checksum:    59680 19221bca088e9ce1d68bb4c65db9ca00
      Sun Sparc architecture:
          Size/MD5 checksum:   725552 cde8744e9e40f33aa8b9f6b8942c314a
          Size/MD5 checksum:    76542 e2ed6f1f3612fbdc5c203195e060c68d
          Size/MD5 checksum:    61558 56204ea6db0a0342920f8381e07df3ae
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"131","title":"Preventing information leakage","votes":"3","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.