Bug#271933: marked as done (CAN-2004-0786: apr_uri_parse() buffer overflow)

2004-09-16 Thread Debian Bug Tracking System
Your message dated Thu, 16 Sep 2004 12:02:29 +0100 with message-id [EMAIL PROTECTED] and subject line Fixed in incoming has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to

Bug#271945: apache in woody is missing security patches/updates

2004-09-16 Thread Mark Bryars
Package: apache Version: 1.3.26-0woody5 Tags: woody, security In 1.3.28 there is a patch that prevents file descriptors leaking to child processes, this is not present. This causes processes spawned by php (in this case 4.1.2-6woody3, not tested 4.1.2-7.0.1 yet) to have full access to the apache

Bug#271945: apache in woody is missing security patches/updates

2004-09-16 Thread Matt Zimmerman
Maintainers, please raise the severity of this bug and contact the security team if this is an urgent issue. -- - mdz

Bug#271933: CAN-2004-0786: apr_uri_parse() buffer overflow

2004-09-16 Thread Florian Weimer
Package: libapr0 Version: 2.0.50-12 Severity: grave Tags: security Justification: user security hole Uniras has reported a vulnerability in apr-util: http://www.uniras.gov.uk/vuls/2004/403518/index.htm The identified vulnerability is in the apr-util library; the apr_uri_parse function in the

Re: Bug#271945: apache in woody is missing security patches/updates

2004-09-16 Thread Fabio Massimo Di Nitto
On Thu, 16 Sep 2004, Matt Zimmerman wrote: Maintainers, please raise the severity of this bug and contact the security team if this is an urgent issue. Please can we have at least the CAN number and reference? Joey has been keeping track of this iirc. Fabio -- user fajita: step one fajita

Bug#271945: apache in woody is missing security patches/updates

2004-09-16 Thread Matt Zimmerman
On Thu, Sep 16, 2004 at 10:09:19PM +0200, Fabio Massimo Di Nitto wrote: On Thu, 16 Sep 2004, Matt Zimmerman wrote: Maintainers, please raise the severity of this bug and contact the security team if this is an urgent issue. Please can we have at least the CAN number and reference? Joey