-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2532-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst August 22, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libapache2-mod-rpaf Vulnerability : denial of service Problem type : remote Debian-specific: no Debian Bug : 683984 Sébastien Bocahu discovered that the reverse proxy add forward module for the Apache webserver is vulnerable to a denial of service attack through a single crafted request with many headers. For the stable distribution (squeeze), this problem has been fixed in version 0.5-3+squeeze1. For the testing distribution (wheezy) and unstable distribution (sid), this problem has been fixed in version 0.6-1. We recommend that you upgrade your libapache2-mod-rpaf packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJQNKtQAAoJEFb2GnlAHawEaUkH+wdRLyuoCX/rRWKZj4iBXvwf 1Bg15195v46twiz+8EoXWAHeZ68tiqbkXBwlcA7KryB9hKuOOw6OAWLKAR0p1HnA rTgECXJbgirnbqJm9X6he2bBeZHtL04pqChcSGStyuW4xe9FF0LXDeVVZWasQVb1 fTVbc5IKM04oikhQEcsvem2+o6yWxVkF7EXVT2oEU5E97zmbpyhAYPd3/TvX9fa0 YCBd9I9fiKYesOKFuG6V3p+ph64g6VE1o5KCJ9ClbH4MTueBat2PVGbYmqmkp/Gh VOZdztKS4h11yi+mFYSDwBAibOW82P6VSCUebXwK8Sd3vNxYxnICdj2HCiE0tWQ= =hIpt -----END PGP SIGNATURE-----