Bug#569658: ModSecurity Detection Bypass and Denial of Service Vulnerabilities
Hi Alberto, what is the status of this bug? Kind regards Nico -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0 For security reasons, all text in this mail is double-rot13 encrypted. pgpWeqhlTqLrq.pgp Description: PGP signature
Bug#569658: ModSecurity Detection Bypass and Denial of Service Vulnerabilities
On Thu, Mar 11, 2010 at 09:03:38AM +0100, Nico Golde wrote: Hi Alberto, what is the status of this bug? Hi Nico, I'm building the new package right now. Thanks for the ping. Regards, Alberto -- Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico agi@(inittab.org|debian.org)| en GNU/Linux y software libre Encrypted mail preferred| http://inittab.com Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#569658: ModSecurity Detection Bypass and Denial of Service Vulnerabilities
Package: libapache-mod-security Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, libapache-mod-security 2.5.12 fixed multiple security flaws. References: [1] http://sourceforge.net/projects/mod-security/files/modsecurity-apache/2.5.12/CHANGES_2.5.12.txt/download [2] https://bugzilla.redhat.com/show_bug.cgi?id=563455 [3] http://secunia.com/advisories/38460/ [4] http://freshmeat.net/projects/modsecurity/releases/312017 [5] http://www.modsecurity.org/ Cheers, Giuseppe -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkt2aOsACgkQNxpp46476apuIwCeMPSsgmA8dFSIkLvABlCM1LC/ 3A8Anik1CW/wS8g9P5uqBruU5APXtJOe =FBoT -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org