|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : mod_python SUMMARY : Remote denial of service vulnerability DATE : 2004-04-12 15:06:00 ID : CLA-2004:837 RELEVANT RELEASES : 8, 9 - ------------------------------------------------------------------------- DESCRIPTION The package mod_python provides an Apache module that embeds the Python interpreter within the server. This update fixes a remote denial of service vulnerabiliy[1] in Apache web-servers which have mod_python enabled (this is not the default in Conectiva Linux). An attacker can crash an apache child process by sending a specially crafted message that triggers the bug in mod_python. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0973 to this issue[2]. SOLUTION All mod_python users should do the upgrade. Notice that after the installation you have to restart the httpd service manually in order to load the new module. To achieve this you may execute the following command (as root): # service httpd restart REFERENCES 1.http://www.modpython.org/pipermail/mod_python/2003-November/0 04005.html 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0973 UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/8/RPMS/mod_python-2.7.10-1U80 _1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/SRPMS/mod_python-2.7.10-1U8 0_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_python-3.0.4-28605 U90_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_python-doc-3.0.4-28 605U90_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/SRPMS/mod_python-3.0.4-28605 U90_1cl.src.rpm ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades: - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions regarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- Copyright (c) 2004 Conectiva Inc. http://www.conectiva.com - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQFAetrP42jd0JmAcZARAmbZAKDkUjQPGQYS29by97PD5LySecw2OgCgkyGN SUW0N0VXYXVZc6CyI8aCohE= =qaf4 -----END PGP SIGNATURE-----