- -------------------------------------------------------------------------- Debian-Edu/Skolelinux Security Advisory DESA 2004-007 http://www.skolelinux.org/security/ Finn-Arne Johansen June 29th, 2004 debian-edu-security@lists.alioth.debian.org - -------------------------------------------------------------------------- Package : apache Vulnerability : buffer overflow Problem-Type : remote Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0492 DSA ID : DSA 525-1 Georgi Guninski discovered a buffer overflow bug in Apache's mod_proxy module. This is not used by default in a Debian-edu setup, but we urge you to upgraded nonetheless. For a more detailed description, take a look at the Debian Security Advisory which describes the same vulnerabilities: http://www.debian.org/security/2004/dsa-525 New packages are availible from http://security.debian.org. We recommend that you upgrade your apache package. Upgrade Instructions - -------------------- Make sure 'deb htts://security.debian.org/ stable/updates main present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. apt-get install apache - -------------------------------------------------------------------------- Mailing list: bruker@skolelinux.no, debian-edu@lists.debian.org, linuxiskolen@skolelinux.no Package info: `apt-cache show '