"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1810-1 security@debian.org
http://www.debian.org/security/ Stefan Fritsch
June 02, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : libapache-mod-jk
Vulnerability : information disclosure
Problem type : remote
Debian-specific: no
CVE ID : CVE-2008-5519
Debian Bug : 523054
An information disclosure flaw was found in mod_jk, the Tomcat Connector
module for Apache. If a buggy client included the "Content-Length" header
without providing request body data, or if a client sent repeated
equests very quickly, one client could obtain a response intended for
another client.
For the stable distribution (lenny), this problem has been fixed in
version 1:1.2.26-2+lenny1.
The oldstable distribution (etch), this problem has been fixed in
version 1:1.2.18-3etch2.
For the testing distribution (squeeze) and the unstable distribution
(sid), this problem has been fixed in version 1:1.2.26-2.1.
We recommend that you upgrade your libapache-mod-jk packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2.dsc
Size/MD5 checksum: 935 dc3dd860d8c7a2710943903b485b1afa
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2.diff.gz
Size/MD5 checksum: 11556 889ac12a51c93772cefad6af5225f7f7
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18.orig.tar.gz
Size/MD5 checksum: 929823 58e1b9406e0cfe11bd4bc297ba146b4f
Architecture independent packages:
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk-doc_1.2.18-3etch2_all.deb
Size/MD5 checksum: 118140 04190ed8b2fc8fea1bf98b1b1df14e9b
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_alpha.deb
Size/MD5 checksum: 101802 b21ab36fc88cf555f9afe1f181124030
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_alpha.deb
Size/MD5 checksum: 98112 29507ac73774562be5c8824cbbcc9131
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_amd64.deb
Size/MD5 checksum: 97470 5a137194ffad6aca9bdfa2760447d635
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_amd64.deb
Size/MD5 checksum: 93722 8642501f8588c5cf7fc990ccdd23ec4b
arm architecture (ARM)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_arm.deb
Size/MD5 checksum: 92860 e11d9d8cf00d6aa71a369d99c92b23f4
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_arm.deb
Size/MD5 checksum: 89258 11fbf05bce072618c3f229c2986e23a6
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_hppa.deb
Size/MD5 checksum: 102432 400787b4e1bc663e2a9dc3c0127c4e73
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_hppa.deb
Size/MD5 checksum: 106314 63572306d8c9d8ea8c47e66b809195fd
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_i386.deb
Size/MD5 checksum: 93386 92d553ae68620971f9b81d81400cc7aa
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_i386.deb
Size/MD5 checksum: 89482 028881fdbf37c27de6fa3edd8fbd05c4
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_ia64.deb
Size/MD5 checksum: 120858 6919a34dfa3dfee634a9642604a3e8ff
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_ia64.deb
Size/MD5 checksum: 125960 cba7d736e52cabbe70de29f0e51cddf5
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_mips.deb
Size/MD5 checksum: 86614 4c1700cd9242c833fa22dfad073756c6
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_mips.deb
Size/MD5 checksum: 89758 e41ac894937a180111156157498843ab
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_mipsel.deb
Size/MD5 checksum: 89858 aa269380dffa92119aa9004f82f98da2
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_mipsel.deb
Size/MD5 checksum: 86710 769d82a08a391758a712b944f54b0cbb
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_powerpc.deb
Size/MD5 checksum: 93420 f576dbcb12dec39481126d4d2b40ffe9
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_powerpc.deb
Size/MD5 checksum: 90220 5716b5070274952d35957e07f33742c0
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_s390.deb
Size/MD5 checksum: 99948 897e7b4cd9acb4a1a735d4e1a49474c9
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_s390.deb
Size/MD5 checksum: 96176 d8f44d62414bc99fcf4360eb64d29b37
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.18-3etch2_sparc.deb
Size/MD5 checksum: 87926 0084f3bdb917e99f666d8fa7832d0b2a
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.18-3etch2_sparc.deb
Size/MD5 checksum: 91398 7ed7eedb497a1a0cecab652eb3bc1195
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.26-2+lenny1.dsc
Size/MD5 checksum: 1336 7070da05cbe8200e7d92dbfe9228ab0e
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.26.orig.tar.gz
Size/MD5 checksum: 1442605 feaec245136bc4d99a9dde95a00ea93c
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.26-2+lenny1.diff.gz
Size/MD5 checksum: 12187 8b6e6b0abd76bae90c99c50ab1fee027
Architecture independent packages:
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache-mod-jk-doc_1.2.26-2+lenny1_all.deb
Size/MD5 checksum: 169998 d31f4efe7b78e94bf1c7cffabce17c6b
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_alpha.deb
Size/MD5 checksum: 125008 0a99d6364abf9b5934dfe0814c9ac589
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_amd64.deb
Size/MD5 checksum: 127806 84fe833769ac2a4cda17fb6f48b3ca6d
arm architecture (ARM)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_arm.deb
Size/MD5 checksum: 130600 81d9d588db9c29c0ff58d9fd395ffdd6
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_armel.deb
Size/MD5 checksum: 133242 efa4faa96460d23682eb36958f475994
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_hppa.deb
Size/MD5 checksum: 126034 45135481a1cc2689b9c5b6910fca0b03
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_i386.deb
Size/MD5 checksum: 109874 bf54bb8f3489715932e5a07739a63dc4
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_ia64.deb
Size/MD5 checksum: 168168 fc402d0ecfb2cf96fb1600633772e418
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_mips.deb
Size/MD5 checksum: 111094 fe05eaac643aa26a9ca1ec755daa36ae
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_mipsel.deb
Size/MD5 checksum: 110106 e037fea37091598bbbd6a0530b090e9c
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_powerpc.deb
Size/MD5 checksum: 121816 f6be93aeec7aea7f10dac6c056086324
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_s390.deb
Size/MD5 checksum: 129412 f3373807d3f321bd6d38b7fcdc4dad8f
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2+lenny1_sparc.deb
Size/MD5 checksum: 118514 3966e3f51da1b24f5fb45c6775c04918
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkolf4MACgkQXm3vHE4uylpOsgCgrr0TyLq4yacpmQoJUQrR3lVD
8GYAoJxTBg46ltOyMxDKH/tVmwq/bNVI
=rsv8
-----END PGP SIGNATURE-----
"
This entry was posted
on 3:44 PM
.
Archives
-
▼
2009
(488)
-
▼
June
(53)
- RHSA-2009:1127-01 Critical: kdelibs security update
- RHSA-2009:1128-01 Important: kdelibs security update
- USN-782-1: Thunderbird vulnerabilities
- RHSA-2009:1125-01 Moderate: thunderbird security u...
- RHSA-2009:1123-01 Moderate: gstreamer-plugins-good...
- USN-791-2: Moodle vulnerability
- RHSA-2009:1130-01 Critical: kdegraphics security u...
- RHSA-2009:1126-01 Moderate: thunderbird security u...
- DSA 1821-1: New amule packages fix insufficient in...
- RHSA-2009:1109-01 Critical: acroread security update
- DSA 1822-1: New mahara packages fix cross-site scr...
- DSA 1817-1: New ctorrent packages fix arbitrary co...
- RHSA-2009:1101-01 Moderate: cscope security update
- USN-788-1: Tomcat vulnerabilities
- DSA 1816-1: New apache2 packages fix privilege esc...
- RHSA-2009:1106-01 Important: kernel security and b...
- RHSA-2009:1102-01 Moderate: cscope security update
- DSA 1818-1: New gforge packages fix insufficient i...
- RHSA-2009:1100-01 Moderate: wireshark security update
- RHSA-2009:1107-01 Moderate: apr-util security update
- USN-775-2: Quagga regression
- DSA 1815-1: New libtorrent-rasterbar packages fix ...
- RHSA-2009:1096-01 Critical: seamonkey security update
- DSA 1814-1: New libsndfile packages fix arbitrary ...
- USN-784-1: ImageMagick vulnerability
- USN-785-1: ipsec-tools vulnerabilities
- RHSA-2009:1087-01 Important: mod_jk security update
- USN-783-1: eCryptfs vulnerability
- USN-781-1: Pidgin vulnerabilities
- RHSA-2009:1081-01 Important: kernel-rt security an...
- DSA 1809-1: New Linux 2.6.26 packages fix several ...
- RHSA-2009:1082-01 Important: cups security update
- USN-780-1: CUPS vulnerability
- USN-780-1: CUPS vulnerability
- DSA 1810-1: New cups/cupsys packages fix denial of...
- DSA 1812-1: New apr-util packages fix several vuln...
- RHSA-2009:1083-01 Important: cups security update
- USN-781-2: Gaim vulnerabilities
- RHSA-2009:1077-01 Important: kernel security and b...
- DSA 1810-1: New libapache-mod-jk packages fix info...
- USN-778-1: cron vulnerability
- RHSA-2009:1076-01 Low: Red Hat Enterprise Linux 2....
- DSA 1807-1: New cyrus-sasl2/cyrus-sasl2-heimdal pa...
- GLSA 200905-06 acpid: Denial of Service
- DSA 1805-1: New pidgin packages fix several vulner...
- GLSA 200905-08 NTP: Remote execution of arbitrary...
- GLSA 200905-07 Pidgin: Multiple vulnerabilities
- RHSA-2009:1067-01 Moderate: Red Hat Application St...
- RHSA-2009:1075-01 Moderate: httpd security update
- GLSA 200905-09 libsndfile: User-assisted executio...
- RHSA-2009:1066-01 Important: squirrelmail security...
- GLSA 200905-03 IPSec Tools: Denial of Service
- GLSA 200905-05 FreeType: Multiple vulnerabilities
-
▼
June
(53)