Your message dated Thu, 16 Sep 2004 12:02:29 +0100
with message-id [EMAIL PROTECTED]
and subject line Fixed in incoming
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to
Package: apache
Version: 1.3.26-0woody5
Tags: woody, security
In 1.3.28 there is a patch that prevents file descriptors leaking to
child processes, this is not present. This causes processes spawned
by php (in this case 4.1.2-6woody3, not tested 4.1.2-7.0.1 yet) to have
full access to the apache
Maintainers, please raise the severity of this bug and contact the security
team if this is an urgent issue.
--
- mdz
Package: libapr0
Version: 2.0.50-12
Severity: grave
Tags: security
Justification: user security hole
Uniras has reported a vulnerability in apr-util:
http://www.uniras.gov.uk/vuls/2004/403518/index.htm
The identified vulnerability is in the apr-util library; the
apr_uri_parse function in the
On Thu, 16 Sep 2004, Matt Zimmerman wrote:
Maintainers, please raise the severity of this bug and contact the security
team if this is an urgent issue.
Please can we have at least the CAN number and reference? Joey has been
keeping track of this iirc.
Fabio
--
user fajita: step one
fajita
On Thu, Sep 16, 2004 at 10:09:19PM +0200, Fabio Massimo Di Nitto wrote:
On Thu, 16 Sep 2004, Matt Zimmerman wrote:
Maintainers, please raise the severity of this bug and contact the security
team if this is an urgent issue.
Please can we have at least the CAN number and reference? Joey
6 matches
Mail list logo