dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Advisories, May 10, 2006

May 11, 2006, 04:45 (0 Talkback[s])

Gentoo Linux


Gentoo Linux Security Advisory GLSA 200605-10

http://security.gentoo.org/


Severity: High
Title: pdnsd: Denial of Service and potential arbitrary code execution
Date: May 10, 2006
Bugs: #131341
ID: 200605-10


Synopsis

pdnsd is vulnerable to a buffer overflow that may result in arbitrary code execution.

Background

pdnsd is a proxy DNS server with permanent caching that is designed to cope with unreachable DNS servers.

Affected packages


     Package        /  Vulnerable  /                        Unaffected

  1  net-dns/pdnsd       < 1.2.4                              >= 1.2.4

Description

The pdnsd team has discovered an unspecified buffer overflow vulnerability. The PROTOS DNS Test Suite, by the Oulu University Secure Programming Group (OUSPG), has also revealed a memory leak error within the handling of the QTYPE and QCLASS DNS queries, leading to consumption of large amounts of memory.

Impact

An attacker can craft malicious DNS queries leading to a Denial of Service, and potentially the execution of arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All pdnsd users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-dns/pdnsd-1.2.4-r1"

References

[ 1 ] CVE-2006-2076

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2076

[ 2 ] CVE-2006-2077

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2077

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200605-10.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


Gentoo Linux Security Advisory GLSA 200605-11

http://security.gentoo.org/


Severity: Normal
Title: Ruby: Denial of Service
Date: May 10, 2006
Bugs: #130657
ID: 200605-11


Synopsis

Ruby WEBrick and XMLRPC servers are vulnerable to Denial of Service.

Background

Ruby is an interpreted scripting language for quick and easy object-oriented programming. It comes bundled with HTTP ("WEBrick") and XMLRPC server objects.

Affected packages


     Package        /  Vulnerable  /                        Unaffected

  1  dev-lang/ruby     < 1.8.4-r1                          >= 1.8.4-r1

Description

Ruby uses blocking sockets for WEBrick and XMLRPC servers.

Impact

An attacker could send large amounts of data to an affected server to block the socket and thus deny other connections to the server.

Workaround

There is no known workaround at this time.

Resolution

All Ruby users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.4-r1"

References

[ 1 ] CVE-2006-1931

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1931

[ 2 ] Ruby release announcement

http://www.ruby-lang.org/en/20051224.html

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200605-11.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


Gentoo Linux Security Advisory GLSA 200605-12

http://security.gentoo.org/


Severity: Normal
Title: Quake 3 engine based games: Buffer Overflow
Date: May 10, 2006
Bugs: #132377
ID: 200605-12


Synopsis

The Quake 3 engine has a vulnerability that could be exploited to execute arbitrary code.

Background

Quake 3 is a multiplayer first person shooter.

Affected packages


     Package                    /  Vulnerable  /            Unaffected


1 games-fps/quake3-bin < 1.32c >= 1.32c 2 games-fps/rtcw < 1.41b >= 1.41b 3 games-fps/enemy-territory < 2.60b >= 2.60b ------------------------------------------------------------------- 3 affected packages on all of their supported architectures.

Description

landser discovered a vulnerability within the "remapShader" command. Due to a boundary handling error in "remapShader", there is a possibility of a buffer overflow.

Impact

An attacker could set up a malicious game server and entice users to connect to it, potentially resulting in the execution of arbitrary code with the rights of the game user.

Workaround

Do not connect to untrusted game servers.

Resolution

All Quake 3 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=games-fps/quake3-bin-1.32c"

All RTCW users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=games-fps/rtcw-1.41b"

All Enemy Territory users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=games-fps/enemy-territory-2.60b"

References

[ 1 ] CVE-2006-2236

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2236

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200605-12.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Mandriva Linux


Mandriva Linux Security Advisory MDKSA-2006:083
http://www.mandriva.com/security/


Package : gdm
Date : May 9, 2006
Affected: 2006.0


Problem Description:

A race condition in daemon/slave.c in gdm before 2.14.1 allows local users to gain privileges via a symlink attack when gdm performs chown and chgrp operations on the .ICEauthority file.

Packages have been patched to correct this issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1057


Updated Packages:

Mandriva Linux 2006.0:
d252ac2b6b8e0ea6c42b97d12154e054 2006.0/RPMS/gdm-2.8.0.4-1.1.20060mdk.i586.rpm
06c26efefc15238226177bcf2b557f98 2006.0/RPMS/gdm-Xnest-2.8.0.4-1.1.20060mdk.i586.rpm
7061440dac40a07c55a14e2a1f673536 2006.0/SRPMS/gdm-2.8.0.4-1.1.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
aaa20636b30f9b8df2c9c538b7c77635 x86_64/2006.0/RPMS/gdm-2.8.0.4-1.1.20060mdk.x86_64.rpm
ac0ab88f60162481348072b67151883a x86_64/2006.0/RPMS/gdm-Xnest-2.8.0.4-1.1.20060mdk.x86_64.rpm
7061440dac40a07c55a14e2a1f673536 x86_64/2006.0/SRPMS/gdm-2.8.0.4-1.1.20060mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com>


Mandriva Linux Security Advisory MDKSA-2006:084
http://www.mandriva.com/security/


Package : MySQL
Date : May 10, 2006
Affected: 10.2, 2006.0, Corporate 3.0, Multi Network Firewall 2.0


Problem Description:

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read. (CVE-2006-1516)

sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message. (CVE-2006-1517)

Updated packages have been patched to correct these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517


Updated Packages:

Mandriva Linux 10.2:
4909fe2f65460b5d570c6a7ba9cff866 10.2/RPMS/libmysql14-4.1.11-1.4.102mdk.i586.rpm
2abf3bab6adb4c55869189a77fc3fb55 10.2/RPMS/libmysql14-devel-4.1.11-1.4.102mdk.i586.rpm
5f7cb8b59cec81673b33c8f288854cdd 10.2/RPMS/MySQL-4.1.11-1.4.102mdk.i586.rpm
baf754c73e1d9d5d075af16bbb670865 10.2/RPMS/MySQL-bench-4.1.11-1.4.102mdk.i586.rpm
4186fd1a7a4addda9ed50c142f09e0ad 10.2/RPMS/MySQL-client-4.1.11-1.4.102mdk.i586.rpm
26c570f455d7113f2af79493fce1f09c 10.2/RPMS/MySQL-common-4.1.11-1.4.102mdk.i586.rpm
feb16e6ba1272758d8eb5b03960a8109 10.2/RPMS/MySQL-Max-4.1.11-1.4.102mdk.i586.rpm
ff61354715f761a46a8910141c17308d 10.2/RPMS/MySQL-NDB-4.1.11-1.4.102mdk.i586.rpm
52cbe54bd00e29484c6c25735c7bcb94 10.2/SRPMS/MySQL-4.1.11-1.4.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
505a4c981db838708fdf1f63bb8bf1d9 x86_64/10.2/RPMS/lib64mysql14-4.1.11-1.4.102mdk.x86_64.rpm
58cfd4b6f1c2a44475fc4e0b155c411b x86_64/10.2/RPMS/lib64mysql14-devel-4.1.11-1.4.102mdk.x86_64.rpm
71b93f12b9441a16a674e21d083fb106 x86_64/10.2/RPMS/MySQL-4.1.11-1.4.102mdk.x86_64.rpm
e2453637f22fdc0035972e22ed5446d5 x86_64/10.2/RPMS/MySQL-bench-4.1.11-1.4.102mdk.x86_64.rpm
924a711c2d7bfcb183e67c0ed8455cdf x86_64/10.2/RPMS/MySQL-client-4.1.11-1.4.102mdk.x86_64.rpm
fea020684cfe4447d84b236ed3eb8712 x86_64/10.2/RPMS/MySQL-common-4.1.11-1.4.102mdk.x86_64.rpm
4f613498aba6803507a6210025c364bd x86_64/10.2/RPMS/MySQL-Max-4.1.11-1.4.102mdk.x86_64.rpm
d211d2b6bef7e4a8702b6d10f1a2e9c8 x86_64/10.2/RPMS/MySQL-NDB-4.1.11-1.4.102mdk.x86_64.rpm
52cbe54bd00e29484c6c25735c7bcb94 x86_64/10.2/SRPMS/MySQL-4.1.11-1.4.102mdk.src.rpm

Mandriva Linux 2006.0:
1116c2cbc0a6f7b443caa1db80b7cc96 2006.0/RPMS/libmysql14-4.1.12-3.2.20060mdk.i586.rpm
a1d6f0b6b6c3441723ddce425f9d7962 2006.0/RPMS/libmysql14-devel-4.1.12-3.2.20060mdk.i586.rpm
9d8d79e0b992d7014e6fc48e759a6588 2006.0/RPMS/MySQL-4.1.12-3.2.20060mdk.i586.rpm
f1b66a2737dd7cd25e91807fc228b538 2006.0/RPMS/MySQL-bench-4.1.12-3.2.20060mdk.i586.rpm
9ff1b0895c676d7fb397be4d0696b510 2006.0/RPMS/MySQL-client-4.1.12-3.2.20060mdk.i586.rpm
d9a488579d2318523bdd59bf3bea426c 2006.0/RPMS/MySQL-common-4.1.12-3.2.20060mdk.i586.rpm
465af10c347f571dc01af650bd26c1ff 2006.0/RPMS/MySQL-Max-4.1.12-3.2.20060mdk.i586.rpm
113a35b2c5d17ce60404787fcee90146 2006.0/RPMS/MySQL-NDB-4.1.12-3.2.20060mdk.i586.rpm
5b2a2092676086292383ac5178cb0be1 2006.0/RPMS/X11R6-contrib-6.9.0-5.6.20060mdk.i586.rpm
fab0e8f7d4365d264c28e5f731d3d34b 2006.0/SRPMS/MySQL-4.1.12-3.2.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
95076266d5ef2642c402f7130cdfe241 x86_64/2006.0/RPMS/lib64mysql14-4.1.12-3.2.20060mdk.x86_64.rpm
acbdc71b998c812c24ed7114c368ece3 x86_64/2006.0/RPMS/lib64mysql14-devel-4.1.12-3.2.20060mdk.x86_64.rpm
ea9a4fc478ddeb0fafaa50e0ea4a208f x86_64/2006.0/RPMS/MySQL-4.1.12-3.2.20060mdk.x86_64.rpm
fef7934cf4bee099e8e64bc0b75f885d x86_64/2006.0/RPMS/MySQL-bench-4.1.12-3.2.20060mdk.x86_64.rpm
e713937238d32342925e65ef301585e7 x86_64/2006.0/RPMS/MySQL-client-4.1.12-3.2.20060mdk.x86_64.rpm
1f36af145e87802e37c673a66360fe34 x86_64/2006.0/RPMS/MySQL-common-4.1.12-3.2.20060mdk.x86_64.rpm
c24793f5e9e10a9601db7dac7d096b29 x86_64/2006.0/RPMS/MySQL-Max-4.1.12-3.2.20060mdk.x86_64.rpm
82b03a0968e65e92cdb569d8149e0fd1 x86_64/2006.0/RPMS/MySQL-NDB-4.1.12-3.2.20060mdk.x86_64.rpm
fab0e8f7d4365d264c28e5f731d3d34b x86_64/2006.0/SRPMS/MySQL-4.1.12-3.2.20060mdk.src.rpm

Corporate 3.0:
08e6f2ab4f9e4c527519fb927cd1bbd7 corporate/3.0/RPMS/libmysql12-4.0.18-1.9.C30mdk.i586.rpm
01de6e536bcd09a1b61c41b1f42f2f72 corporate/3.0/RPMS/libmysql12-devel-4.0.18-1.9.C30mdk.i586.rpm
ddf99e4e753c37709883b04d1cf2030a corporate/3.0/RPMS/MySQL-4.0.18-1.9.C30mdk.i586.rpm
4cee7ed9d192be77d78dd72d8fcd2eaa corporate/3.0/RPMS/MySQL-bench-4.0.18-1.9.C30mdk.i586.rpm
65faadbbd953da2f71e7ba575aabd9c5 corporate/3.0/RPMS/MySQL-client-4.0.18-1.9.C30mdk.i586.rpm
d88cb2542f68be1438770e916cedfbf8 corporate/3.0/RPMS/MySQL-common-4.0.18-1.9.C30mdk.i586.rpm
8930f8e648b838abad0e905402d7f098 corporate/3.0/RPMS/MySQL-Max-4.0.18-1.9.C30mdk.i586.rpm
d67f3b91058f8e17bf72d75b1d131e2d corporate/3.0/SRPMS/MySQL-4.0.18-1.9.C30mdk.src.rpm

Corporate 3.0/X86_64:
85adbefb6c932da4febb94fbd9ad477c x86_64/corporate/3.0/RPMS/lib64mysql12-4.0.18-1.9.C30mdk.x86_64.rpm
d94af3b74686045910e2330bd5245a30 x86_64/corporate/3.0/RPMS/lib64mysql12-devel-4.0.18-1.9.C30mdk.x86_64.rpm
36f0d3bb53766d832fce145d119f52c9 x86_64/corporate/3.0/RPMS/MySQL-4.0.18-1.9.C30mdk.x86_64.rpm
538493e0ec4636f1dd0ec0ef8a26165c x86_64/corporate/3.0/RPMS/MySQL-bench-4.0.18-1.9.C30mdk.x86_64.rpm
6773bce043fabd3871ec292bcbe20e7a x86_64/corporate/3.0/RPMS/MySQL-client-4.0.18-1.9.C30mdk.x86_64.rpm
fd0876c6a9dfe36df6d116ce5433b152 x86_64/corporate/3.0/RPMS/MySQL-common-4.0.18-1.9.C30mdk.x86_64.rpm
808c8c1e8d107e810a2a16f0be2aa5ac x86_64/corporate/3.0/RPMS/MySQL-Max-4.0.18-1.9.C30mdk.x86_64.rpm
d67f3b91058f8e17bf72d75b1d131e2d x86_64/corporate/3.0/SRPMS/MySQL-4.0.18-1.9.C30mdk.src.rpm

Multi Network Firewall 2.0:
516e242273227de34c51bc5d5ddd23fd mnf/2.0/RPMS/libmysql12-4.0.18-1.9.M20mdk.i586.rpm
043291efac87bbdcb08ecb706ba4301d mnf/2.0/SRPMS/MySQL-4.0.18-1.9.M20mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com>


Mandriva Linux Security Advisory MDKSA-2006:085
http://www.mandriva.com/security/


Package : xine-ui
Date : May 10, 2006
Affected: 2006.0, Corporate 3.0


Problem Description:

Multiple format string vulnerabilities in xiTK (xitk/main.c) in xine allow remote attackers to execute arbitrary code via format string specifiers in a long filename on an EXTINFO line in a playlist file.

Packages have been patched to correct this issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1905


Updated Packages:

Mandriva Linux 2006.0:
650fe424e812f24ca55fbae9ac58f191 2006.0/RPMS/xine-ui-0.99.4-1.1.20060mdk.i586.rpm
93642d5dcbf76bdb55f6a1b79a82a740 2006.0/RPMS/xine-ui-aa-0.99.4-1.1.20060mdk.i586.rpm
233e02e5d13ea968b7497a67df0094a9 2006.0/RPMS/xine-ui-fb-0.99.4-1.1.20060mdk.i586.rpm
f4b89ad1d813c792c5700861b360066f 2006.0/SRPMS/xine-ui-0.99.4-1.1.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
71e490c1d0941c5c93601968165af681 x86_64/2006.0/RPMS/xine-ui-0.99.4-1.1.20060mdk.x86_64.rpm
263a49cfbf4be6832af2f583b0e30ea8 x86_64/2006.0/RPMS/xine-ui-aa-0.99.4-1.1.20060mdk.x86_64.rpm
2f6a5637fd940883b8381491dc1fa403 x86_64/2006.0/RPMS/xine-ui-fb-0.99.4-1.1.20060mdk.x86_64.rpm
f4b89ad1d813c792c5700861b360066f x86_64/2006.0/SRPMS/xine-ui-0.99.4-1.1.20060mdk.src.rpm

Corporate 3.0:
19461fcb7b20d100d804d59a156d47e9 corporate/3.0/RPMS/xine-ui-0.9.23-3.3.C30mdk.i586.rpm
e72a7090b1027ffd1d051785ba638d2b corporate/3.0/RPMS/xine-ui-aa-0.9.23-3.3.C30mdk.i586.rpm
9f735f80528fbe7645819b8c7ee1392e corporate/3.0/RPMS/xine-ui-fb-0.9.23-3.3.C30mdk.i586.rpm
70b43223c2a42e044cc92e6721b9c074 corporate/3.0/SRPMS/xine-ui-0.9.23-3.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
40d8285c71ff0b1c6649576ba98bb1d3 x86_64/corporate/3.0/RPMS/xine-ui-0.9.23-3.3.C30mdk.x86_64.rpm
a8ed9fe1599138cfa39dc8a748bbcb3d x86_64/corporate/3.0/RPMS/xine-ui-aa-0.9.23-3.3.C30mdk.x86_64.rpm
53a46955f3dff408ff65995043ec30da x86_64/corporate/3.0/RPMS/xine-ui-fb-0.9.23-3.3.C30mdk.x86_64.rpm
70b43223c2a42e044cc92e6721b9c074 x86_64/corporate/3.0/SRPMS/xine-ui-0.9.23-3.3.C30mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com>

Slackware Linux

[slackware-security] Apache httpd redux (SSA:2006-130-01)

New Apache packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix a bug with Apache 1.3.35 and glibc that breaks wildcards in Include directives. It may not occur with all versions of glibc, but it has been verified on -current (using an Include within a file already Included causes a crash), so better to patch it and reissue these packages just to be sure. My apologies if the last batch of updates caused anyone undue grief... they worked here with my (too simple?) config files.

Note that if you use mod_ssl, you'll also require the mod_ssl package that was part of yesterday's release, and on -current you'll need the newest PHP package (if you use PHP).

Thanks to Francesco Gringoli for bringing this issue to my attention.

Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/apache-1.3.35-i486-2_slack10.2.tgz:
Patched to fix totally broken Include behavior.
Thanks to Francesco Gringoli for reporting this bug.
+--------------------------+

Where to find the new packages:

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/apache-1.3.35-i386-2_slack8.1.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/apache-1.3.35-i386-2_slack9.0.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/apache-1.3.35-i486-2_slack9.1.tgz

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/apache-1.3.35-i486-2_slack10.0.tgz

Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/apache-1.3.35-i486-2_slack10.1.tgz

Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/apache-1.3.35-i486-2_slack10.2.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/apache-1.3.35-i486-2.tgz

MD5 signatures:

Slackware 8.1 package:
3affa50debe634e148d8cfed98733a47 apache-1.3.35-i386-2_slack8.1.tgz

Slackware 9.0 package:
d3d5c446c6b16c84d17a43c0e836071c apache-1.3.35-i386-2_slack9.0.tgz

Slackware 9.1 package:
daa91eb34cd487f7621301f95ac931ce apache-1.3.35-i486-2_slack9.1.tgz

Slackware 10.0 package:
d4031f1dc80659091c9b83a9bfed2a9e apache-1.3.35-i486-2_slack10.0.tgz

Slackware 10.1 package:
a1239458270ae312f4d7f510cbd9785b apache-1.3.35-i486-2_slack10.1.tgz

Slackware 10.2 package:
78130e24c739ea5c3569a0ab6647a7df apache-1.3.35-i486-2_slack10.2.tgz

Slackware -current packages:
4b961ce755054c1820988ff0192922ad apache-1.3.35-i486-2.tgz

Installation instructions:

First, stop apache:

# apachectl stop

Then, upgrade the apache package:

# upgradepkg apache-1.3.35-i486-2_slack10.2.tgz

Finally, restart apache:

# apachectl start

Or, if you use mod_ssl:

# apachectl startssl

+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com