-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Trustix Secure Linux Security Advisory #2004-0031 Package name: apache Summary: Date: 2004-06-02 Affected versions: Trustix Secure Linux 1.5 Trustix Secure Linux 2.0 Trustix Secure Linux 2.1 Trustix Secure Enterprise Linux 2 - -------------------------------------------------------------------------- Package description: Apache is a full featured web server that is freely available, and also happens to be the most widely used. Built with loadable modules (all standard modules enabled). This verion is intended as a replacement for a standard apache, the configuration files provided with apache and apache-ssl are unchanged. Problem description: Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488 Action: We recommend that all systems with this package installed be upgraded. Please note that if you do not need the functionality provided by this package, you may want to remove it from your system. Location: All Trustix Secure Linux updates are available from <URI:http://http.trustix.org/pub/trustix/updates/> <URI:ftp://ftp.trustix.org/pub/trustix/updates/> About Trustix Secure Linux: Trustix Secure Linux is a small Linux distribution for servers. With focus on security and stability, the system is painlessly kept safe and up to date from day one using swup, the automated software updater. Automatic updates: Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'. Public testing: Most updates for Trustix Secure Linux are made available for public testing some time before release. If you want to contribute by testing the various packages in the testing tree, please feel free to share your findings on the tsl-discuss mailinglist. The testing tree is located at <URI:http://tsldev.trustix.org/horizon/> You may also use swup for public testing of updates: site { class = 0 location = "http://tsldev.trustix.org/horizon/rdfs/latest.rdf" regexp = ".*" } Questions? Check out our mailing lists: <URI:http://www.trustix.org/support/> Verification: This advisory along with all Trustix packages are signed with the TSL sign key. This key is available from: <URI:http://www.trustix.org/TSL-SIGN-KEY> The advisory itself is available from the errata pages at <URI:http://www.trustix.org/errata/trustix-1.5/>, <URI:http://www.trustix.org/errata/trustix-2.0/> and <URI:http://www.trustix.org/errata/trustix-2.1/> or directly at <URI:http://www.trustix.org/errata/2004/0031> MD5sums of the packages: - -------------------------------------------------------------------------- 3ed253daf8927be60212442a3050f691 tsel-2/apache-2.0.49-7tr.i586.rpm 9fb3d9424f6fc1ec4289712a20899fa7 tsel-2/apache-dbm-2.0.49-7tr.i586.rpm 9fe83b2b8894d2980f7854b42d5c026b tsel-2/apache-devel-2.0.49-7tr.i586.rpm 36b13c423f17d903616a7483264370eb tsel-2/apache-manual-2.0.49-7tr.i586.rpm 79942721f12067c42160376c853d4f49 2.1/rpms/apache-2.0.49-7tr.i586.rpm c6cb07a964b4147f208b20fd6f4ab5ba 2.1/rpms/apache-dbm-2.0.49-7tr.i586.rpm 8b3739ca31dc03d0e48771ea220f21b1 2.1/rpms/apache-devel-2.0.49-7tr.i586.rpm a9f53eed9b923741c77432bdfbfc91e4 2.1/rpms/apache-manual-2.0.49-7tr.i586.rpm 9e142f0ccbc2978e76cfeb0aa6085143 2.0/rpms/apache-2.0.49-2tr.i586.rpm c9fc1991963a238c48c9b82c0c00def4 2.0/rpms/apache-devel-2.0.49-2tr.i586.rpm 8bad2bf97c4fb5e8cb65aec53b0dec31 2.0/rpms/apache-manual-2.0.49-2tr.i586.rpm 1b6c4c97d574094142525409a75dc706 1.5/rpms/apache-1.3.31-2tr.i586.rpm 9c0db86b4fe6f0d689bfcb7a404a8530 1.5/rpms/apache-devel-1.3.31-2tr.i586.rpm - -------------------------------------------------------------------------- Trustix Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQFAvasWi8CEzsK9IksRAiiJAKC4/SdufzfeIf229QRGoiuFvXw8wQCgpIcc NTKAMgzA8/USoadLVWbIKi0= =dlj+ -----END PGP SIGNATURE-----