Your message dated Fri, 05 Apr 2024 04:34:28 +
with message-id
and subject line Bug#1054564: fixed in apache2 2.4.59-1
has caused the Debian Bug report #1054564,
regarding apache2: mod_proxy_connect insecure default server-wide AllowCONNECT
value
to be marked as done.
This means that you
Your message dated Fri, 05 Apr 2024 04:34:28 +
with message-id
and subject line Bug#1032628: fixed in apache2 2.4.59-1
has caused the Debian Bug report #1032628,
regarding please drop transitional package libapache2-mod-proxy-uwsgi from
src:apache2
to be marked as done.
This means that you
apache2_2.4.59-1_sourceonly.changes uploaded successfully to localhost
along with the files:
apache2_2.4.59-1.dsc
apache2_2.4.59.orig.tar.gz
apache2_2.4.59.orig.tar.gz.asc
apache2_2.4.59-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 05 Apr 2024 08:08:11 +0400
Source: apache2
Built-For-Profiles: nocheck
Architecture: source
Version: 2.4.59-1
Distribution: unstable
Urgency: medium
Maintainer: Debian
Processing commands for cont...@bugs.debian.org:
> tags 1068412 + upstream
Bug #1068412 [src:apache2] apache2: CVE-2024-27316 CVE-2024-24795 CVE-2023-38709
Added tag(s) upstream.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
1068412:
Processing commands for cont...@bugs.debian.org:
> found 1068412 2.4.58-1
Bug #1068412 [src:apache2] apache2: CVE-2024-27316 CVE-2024-24795 CVE-2023-38709
Marked as found in versions apache2/2.4.58-1.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
1068412:
Source: apache2
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for apache2.
CVE-2024-27316[0]:
https://www.kb.cert.org/vuls/id/421644
https://www.openwall.com/lists/oss-security/2024/04/04/4
CVE-2024-24795[1]:
7 matches
Mail list logo