Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 128610 - www-apache/libapreq2: Incomplete correction for previous DoS vulnerability (CVE-2006-0042)
Summary: www-apache/libapreq2: Incomplete correction for previous DoS vulnerability (C...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://www.cve.mitre.org/cgi-bin/cven...
Whiteboard: B3 [glsa] DerCorny
Keywords:
Depends on:
Blocks:
 
Reported: 2006-04-03 01:05 UTC by Jasper Bryant-Greene
Modified: 2006-04-17 10:39 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jasper Bryant-Greene 2006-04-03 01:05:19 UTC
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1000-2                    security@debian.org
http://www.debian.org/security/                             Martin Schulze
April 3rd, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : libapreq2-perl
Vulnerability  : design error
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2006-0042
BugTraq ID     : 16710
Debian Bug     : 354060 358689

Gunnar Wolf noticed that the correction for the following problem was
not complete and requires an update.  For completeness we're
providing the original problem description:

   An algorithm weakness has been discovered in Apache2::Request, the
   generic request library for Apache2 which can be exploited remotely
   and cause a denial of service via CPU consumption.

The old stable distribution (woody) does not contain this package.

For the stable distribution (sarge) this problem has been fixed in
version 2.04-dev-1sarge2.

For the unstable distribution (sid) this problem has been fixed in
version 2.07-1.

We recommend that you upgrade your libapreq2, libapache2-mod-apreq2
and libapache2-request-perl packages.
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2006-04-03 01:22:22 UTC
pcc and x86 please mark stable, thank you.
Comment 2 Tobias Scherbaum (RETIRED) gentoo-dev 2006-04-03 10:25:47 UTC
ppc stable
Comment 3 Bryan Østergaard (RETIRED) gentoo-dev 2006-04-08 15:44:36 UTC
Stable on x86.
Comment 4 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-04-08 15:48:55 UTC
nice :)

CPU consumption : not sure a GLSA is needed. Really not.
Comment 5 Thierry Carrez (RETIRED) gentoo-dev 2006-04-09 03:51:15 UTC
I tend to vote yes. DoS on apache (even by CPU consumption) is nasty.
Comment 6 Stefan Cornelius (RETIRED) gentoo-dev 2006-04-09 09:59:07 UTC
i vote yes here - as Koon said, DoSing apache is evil.
Comment 7 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-04-09 12:33:50 UTC
I tend to vote YES too, so let's have a GLSA.
Comment 8 Thierry Carrez (RETIRED) gentoo-dev 2006-04-17 10:39:46 UTC
GLSA 200604-08, thx everyone