Bug#661735: Log rotation fails after package update without reboot

2012-02-29 Thread Florian Weimer
Package: apache2 Version: 2.2.16-6+squeeze6 It seems that log rotation fails after a package update (including a security update), until the machine is rebooted. Apache keeps logging to the .log.1 file after rotation, it does not switch to the new .log file. I do not fully understand this issue

Bug#543577: apache2: `TraceEnable off` does not disable HTTP TRACE method.

2009-08-25 Thread Florian Weimer
* Anthony Mendez: I also tried enabling mod_rewrite and using that method to disable HTTP Trace and that did not work either. The only software we are running on this server is WeBWork, an online math homework system. More information about WeBWork is avaliable at

Bug#448754: /usr/bin/htpasswd: please give batchable option

2007-11-02 Thread Florian Weimer
* Marc Haber: On Wed, Oct 31, 2007 at 05:13:00PM +0100, Stefan Fritsch wrote: htpasswd is missing a feature there to get the password from a file descriptor. Or from a pipe. This is an upstream issue, can you pass it onwards? The environment is private on Linux, too, but this is not

Bug#416611: libapache-mod-perl: Possible DoS problem with PerlRun (CVE-2007-1349)

2007-03-30 Thread Florian Weimer
* Kjetil Kjernsmo: If I have a PerlRun script, e.g., http://localhost/test/script, and call it using a URL with special symbols like '(' in path_info, PerlRun fails with server error. For example, calling http://localhost/test/script/( produces this error: [Thu Mar 22 10:24:57 2007]

Bug#388443: apache2: MUST NOT send data in an 304 reply

2006-09-24 Thread Florian Weimer
* Christoph Biedl: This would result in a lot of bug reports against the according scripts. But this is the way to go, I'm afraid. Or something could be implemented at the PHP level, I guess. If it's only possible to get a conforming 304 reply by stripping the trailing newline from the .php

Bug#316321: Restarting the server may be required

2006-07-17 Thread Florian Weimer
Reloading Apache 1.3 did not apply all configuration changes in all cases. Has this changed in version 2? If not, it's necessary to restart the server (probably using apachectl graceful, but still). -- Florian Weimer[EMAIL PROTECTED] BFK edv-consulting GmbH http

Bug#349793: apache-common: Cross-site scripting (XSS) vulnerability in the mod_imap module

2006-01-26 Thread Florian Weimer
* Stephen Gran: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352 Uhm, hasn't this been fixed in apache 1.3.34-2 (bug #343466) and apache2 2.0.55-4 (bug #343467)? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#343466: XSS issue in mod_imap

2005-12-15 Thread Florian Weimer
Package: apache Tags: security upstream Severity: important Upstream reports a cross-site scripting issue in Apache: http://issues.apache.org/bugzilla/show_bug.cgi?id=37874 Impact does not seem to be substantial (rather obscure module, specific configuration required, only clients running IE

Bug#343467: [CVE-2005-3352] XSS issue in mod_imap

2005-12-15 Thread Florian Weimer
Package: apache2 Tags: security upstream Severity: important Upstream reports a cross-site scripting issue in Apache: http://issues.apache.org/bugzilla/show_bug.cgi?id=37874 Impact does not seem to be substantial (rather obscure module, specific configuration required, only clients running IE

Bug#328919: apache: mod_usertrack generates non-random cookies

2005-09-18 Thread Florian Weimer
Package: apache Severity: normal mod_usertrack generates non-random cookies (see the source code and http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-1534). I don't think that this is a real security issue because mod_usertrack only uses the cookies for invading user privacy, not for

Bug#267477: Apache 2 TLS by default

2004-12-13 Thread Florian Weimer
* Olaf van der Spek: Instead of just an easy way to enable SSL/TLS, I'd like to see it enabled by default. :) This would be a questionable change because it unnecessarily exposes more program code to potential attacks.

Bug#271933: CAN-2004-0786: apr_uri_parse() buffer overflow

2004-09-16 Thread Florian Weimer
Package: libapr0 Version: 2.0.50-12 Severity: grave Tags: security Justification: user security hole Uniras has reported a vulnerability in apr-util: http://www.uniras.gov.uk/vuls/2004/403518/index.htm The identified vulnerability is in the apr-util library; the apr_uri_parse function in the

Re: draft proposal for a new web server policy

2003-12-11 Thread Florian Weimer
Joey Hess wrote: - Any others? In the default configuration, web servers shall bind to localhost only (okay, that's are more general policy issue affecting all network services).