Bug#320063: marked as done (Security: buffer-overrun in apache2-ssl)

2005-12-17 Thread Debian Bug Tracking System
Your message dated Sat, 17 Dec 2005 00:05:09 -0800
with message-id [EMAIL PROTECTED]
and subject line Bug#320048: fixed in apache2 2.0.54-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 26 Jul 2005 18:45:58 +
From [EMAIL PROTECTED] Tue Jul 26 11:45:58 2005
Return-path: [EMAIL PROTECTED]
Received: from svr.bitshelter.net (mx0.bitshelter.net) [85.10.193.115] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DxURC-0002H7-00; Tue, 26 Jul 2005 11:45:58 -0700
Received: from localhost (localhost [127.0.0.1])
by mx0.bitshelter.net (Postfix) with ESMTP id 2AC873FFEC
for [EMAIL PROTECTED]; Tue, 26 Jul 2005 20:45:54 +0200 (CEST)
Received: from mx0.bitshelter.net ([127.0.0.1])
by localhost (svr.bitshelter.net [127.0.0.1]) (amavisd-new, port 10024)
with LMTP id 29705-01-2 for [EMAIL PROTECTED];
Tue, 26 Jul 2005 20:45:39 +0200 (CEST)
Received: from nz (J1afb.j.pppool.de [85.74.26.251])
(using TLSv1 with cipher RC4-MD5 (128/128 bits))
(No client certificate requested)
by mx0.bitshelter.net (Postfix) with ESMTP id 6A0BD3FF4A
for [EMAIL PROTECTED]; Tue, 26 Jul 2005 20:45:39 +0200 (CEST)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Security: buffer-overrun in apache2-ssl
Date: Tue, 26 Jul 2005 20:45:35 +0200
User-Agent: KMail/1.8.1
X-Fingerprint: BBF9 60C6 892A A542 0006 B208 63F8 974C 8DC6 9FB4
X-PGP: 8DC69FB4
MIME-Version: 1.0
Content-Type: text/plain;
  charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.4 required=4.0 tests=BAYES_00,HAS_PACKAGE,
NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2005_01_02


Package: apache2
Version: 2.0.54-4
Severity:critical
Tags: security, fixed-upstream

There is a possible remote-exploitable buffer overrun in the Apache2 ssl 
implementation. A patch is available.

See
http://issues.apache.org/bugzilla/show_bug.cgi?id=35081
and
http://svn.apache.org/viewcvs?rev=189562view=rev

---
Received: (at 320048-close) by bugs.debian.org; 17 Dec 2005 08:11:00 +
From [EMAIL PROTECTED] Sat Dec 17 00:11:00 2005
Return-path: [EMAIL PROTECTED]
Received: from katie by spohr.debian.org with local (Exim 4.50)
id 1EnX41-0003CA-Ae; Sat, 17 Dec 2005 00:05:09 -0800
From: Adam Conrad [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.17 $
Subject: Bug#320048: fixed in apache2 2.0.54-5
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Sat, 17 Dec 2005 00:05:09 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: apache2
Source-Version: 2.0.54-5

We believe that the bug you reported is fixed in the latest version of
apache2, which is due to be installed in the Debian FTP archive:

apache2-common_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-common_2.0.54-5_i386.deb
apache2-doc_2.0.54-5_all.deb
  to pool/main/a/apache2/apache2-doc_2.0.54-5_all.deb
apache2-mpm-perchild_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-perchild_2.0.54-5_i386.deb
apache2-mpm-prefork_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-prefork_2.0.54-5_i386.deb
apache2-mpm-threadpool_2.0.54-5_all.deb
  to pool/main/a/apache2/apache2-mpm-threadpool_2.0.54-5_all.deb
apache2-mpm-worker_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-worker_2.0.54-5_i386.deb
apache2-prefork-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-prefork-dev_2.0.54-5_i386.deb
apache2-threaded-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-threaded-dev_2.0.54-5_i386.deb
apache2-utils_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-utils_2.0.54-5_i386.deb
apache2_2.0.54-5.diff.gz
  to pool/main/a/apache2/apache2_2.0.54-5.diff.gz
apache2_2.0.54-5.dsc
  to pool/main/a/apache2/apache2_2.0.54-5.dsc
apache2_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2_2.0.54-5_i386.deb
libapr0-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/libapr0-dev_2.0.54-5_i386.deb
libapr0_2.0.54-5_i386.deb
  

Bug#320063: marked as done (Security: buffer-overrun in apache2-ssl)

2005-12-17 Thread Debian Bug Tracking System
Your message dated Sat, 17 Dec 2005 00:05:09 -0800
with message-id [EMAIL PROTECTED]
and subject line Bug#320063: fixed in apache2 2.0.54-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 26 Jul 2005 18:45:58 +
From [EMAIL PROTECTED] Tue Jul 26 11:45:58 2005
Return-path: [EMAIL PROTECTED]
Received: from svr.bitshelter.net (mx0.bitshelter.net) [85.10.193.115] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DxURC-0002H7-00; Tue, 26 Jul 2005 11:45:58 -0700
Received: from localhost (localhost [127.0.0.1])
by mx0.bitshelter.net (Postfix) with ESMTP id 2AC873FFEC
for [EMAIL PROTECTED]; Tue, 26 Jul 2005 20:45:54 +0200 (CEST)
Received: from mx0.bitshelter.net ([127.0.0.1])
by localhost (svr.bitshelter.net [127.0.0.1]) (amavisd-new, port 10024)
with LMTP id 29705-01-2 for [EMAIL PROTECTED];
Tue, 26 Jul 2005 20:45:39 +0200 (CEST)
Received: from nz (J1afb.j.pppool.de [85.74.26.251])
(using TLSv1 with cipher RC4-MD5 (128/128 bits))
(No client certificate requested)
by mx0.bitshelter.net (Postfix) with ESMTP id 6A0BD3FF4A
for [EMAIL PROTECTED]; Tue, 26 Jul 2005 20:45:39 +0200 (CEST)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Security: buffer-overrun in apache2-ssl
Date: Tue, 26 Jul 2005 20:45:35 +0200
User-Agent: KMail/1.8.1
X-Fingerprint: BBF9 60C6 892A A542 0006 B208 63F8 974C 8DC6 9FB4
X-PGP: 8DC69FB4
MIME-Version: 1.0
Content-Type: text/plain;
  charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.4 required=4.0 tests=BAYES_00,HAS_PACKAGE,
NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2005_01_02


Package: apache2
Version: 2.0.54-4
Severity:critical
Tags: security, fixed-upstream

There is a possible remote-exploitable buffer overrun in the Apache2 ssl 
implementation. A patch is available.

See
http://issues.apache.org/bugzilla/show_bug.cgi?id=35081
and
http://svn.apache.org/viewcvs?rev=189562view=rev

---
Received: (at 320063-close) by bugs.debian.org; 17 Dec 2005 08:10:59 +
From [EMAIL PROTECTED] Sat Dec 17 00:10:59 2005
Return-path: [EMAIL PROTECTED]
Received: from katie by spohr.debian.org with local (Exim 4.50)
id 1EnX41-0003CC-Bc; Sat, 17 Dec 2005 00:05:09 -0800
From: Adam Conrad [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.17 $
Subject: Bug#320063: fixed in apache2 2.0.54-5
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Sat, 17 Dec 2005 00:05:09 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: apache2
Source-Version: 2.0.54-5

We believe that the bug you reported is fixed in the latest version of
apache2, which is due to be installed in the Debian FTP archive:

apache2-common_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-common_2.0.54-5_i386.deb
apache2-doc_2.0.54-5_all.deb
  to pool/main/a/apache2/apache2-doc_2.0.54-5_all.deb
apache2-mpm-perchild_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-perchild_2.0.54-5_i386.deb
apache2-mpm-prefork_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-prefork_2.0.54-5_i386.deb
apache2-mpm-threadpool_2.0.54-5_all.deb
  to pool/main/a/apache2/apache2-mpm-threadpool_2.0.54-5_all.deb
apache2-mpm-worker_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-worker_2.0.54-5_i386.deb
apache2-prefork-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-prefork-dev_2.0.54-5_i386.deb
apache2-threaded-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-threaded-dev_2.0.54-5_i386.deb
apache2-utils_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-utils_2.0.54-5_i386.deb
apache2_2.0.54-5.diff.gz
  to pool/main/a/apache2/apache2_2.0.54-5.diff.gz
apache2_2.0.54-5.dsc
  to pool/main/a/apache2/apache2_2.0.54-5.dsc
apache2_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2_2.0.54-5_i386.deb
libapr0-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/libapr0-dev_2.0.54-5_i386.deb
libapr0_2.0.54-5_i386.deb
  to 

Bug#320063: marked as done (Security: buffer-overrun in apache2-ssl)

2005-09-08 Thread Debian Bug Tracking System
Your message dated Thu, 08 Sep 2005 11:17:06 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#320063: fixed in apache2 2.0.54-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 26 Jul 2005 18:45:58 +
From [EMAIL PROTECTED] Tue Jul 26 11:45:58 2005
Return-path: [EMAIL PROTECTED]
Received: from svr.bitshelter.net (mx0.bitshelter.net) [85.10.193.115] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DxURC-0002H7-00; Tue, 26 Jul 2005 11:45:58 -0700
Received: from localhost (localhost [127.0.0.1])
by mx0.bitshelter.net (Postfix) with ESMTP id 2AC873FFEC
for [EMAIL PROTECTED]; Tue, 26 Jul 2005 20:45:54 +0200 (CEST)
Received: from mx0.bitshelter.net ([127.0.0.1])
by localhost (svr.bitshelter.net [127.0.0.1]) (amavisd-new, port 10024)
with LMTP id 29705-01-2 for [EMAIL PROTECTED];
Tue, 26 Jul 2005 20:45:39 +0200 (CEST)
Received: from nz (J1afb.j.pppool.de [85.74.26.251])
(using TLSv1 with cipher RC4-MD5 (128/128 bits))
(No client certificate requested)
by mx0.bitshelter.net (Postfix) with ESMTP id 6A0BD3FF4A
for [EMAIL PROTECTED]; Tue, 26 Jul 2005 20:45:39 +0200 (CEST)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Security: buffer-overrun in apache2-ssl
Date: Tue, 26 Jul 2005 20:45:35 +0200
User-Agent: KMail/1.8.1
X-Fingerprint: BBF9 60C6 892A A542 0006 B208 63F8 974C 8DC6 9FB4
X-PGP: 8DC69FB4
MIME-Version: 1.0
Content-Type: text/plain;
  charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.4 required=4.0 tests=BAYES_00,HAS_PACKAGE,
NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2005_01_02


Package: apache2
Version: 2.0.54-4
Severity:critical
Tags: security, fixed-upstream

There is a possible remote-exploitable buffer overrun in the Apache2 ssl 
implementation. A patch is available.

See
http://issues.apache.org/bugzilla/show_bug.cgi?id=35081
and
http://svn.apache.org/viewcvs?rev=189562view=rev

---
Received: (at 320063-close) by bugs.debian.org; 8 Sep 2005 18:22:55 +
From [EMAIL PROTECTED] Thu Sep 08 11:22:55 2005
Return-path: [EMAIL PROTECTED]
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1EDQxO-00065g-00; Thu, 08 Sep 2005 11:17:06 -0700
From: Adam Conrad [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#320063: fixed in apache2 2.0.54-5
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Thu, 08 Sep 2005 11:17:06 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 3

Source: apache2
Source-Version: 2.0.54-5

We believe that the bug you reported is fixed in the latest version of
apache2, which is due to be installed in the Debian FTP archive:

apache2-common_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-common_2.0.54-5_i386.deb
apache2-doc_2.0.54-5_all.deb
  to pool/main/a/apache2/apache2-doc_2.0.54-5_all.deb
apache2-mpm-perchild_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-perchild_2.0.54-5_i386.deb
apache2-mpm-prefork_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-prefork_2.0.54-5_i386.deb
apache2-mpm-threadpool_2.0.54-5_all.deb
  to pool/main/a/apache2/apache2-mpm-threadpool_2.0.54-5_all.deb
apache2-mpm-worker_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-worker_2.0.54-5_i386.deb
apache2-prefork-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-prefork-dev_2.0.54-5_i386.deb
apache2-threaded-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-threaded-dev_2.0.54-5_i386.deb
apache2-utils_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-utils_2.0.54-5_i386.deb
apache2_2.0.54-5.diff.gz
  to pool/main/a/apache2/apache2_2.0.54-5.diff.gz
apache2_2.0.54-5.dsc
  to pool/main/a/apache2/apache2_2.0.54-5.dsc
apache2_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2_2.0.54-5_i386.deb
libapr0-dev_2.0.54-5_i386.deb
  to 

Bug#320063: marked as done (Security: buffer-overrun in apache2-ssl)

2005-09-08 Thread Debian Bug Tracking System
Your message dated Thu, 08 Sep 2005 11:17:06 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#320048: fixed in apache2 2.0.54-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 26 Jul 2005 18:45:58 +
From [EMAIL PROTECTED] Tue Jul 26 11:45:58 2005
Return-path: [EMAIL PROTECTED]
Received: from svr.bitshelter.net (mx0.bitshelter.net) [85.10.193.115] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1DxURC-0002H7-00; Tue, 26 Jul 2005 11:45:58 -0700
Received: from localhost (localhost [127.0.0.1])
by mx0.bitshelter.net (Postfix) with ESMTP id 2AC873FFEC
for [EMAIL PROTECTED]; Tue, 26 Jul 2005 20:45:54 +0200 (CEST)
Received: from mx0.bitshelter.net ([127.0.0.1])
by localhost (svr.bitshelter.net [127.0.0.1]) (amavisd-new, port 10024)
with LMTP id 29705-01-2 for [EMAIL PROTECTED];
Tue, 26 Jul 2005 20:45:39 +0200 (CEST)
Received: from nz (J1afb.j.pppool.de [85.74.26.251])
(using TLSv1 with cipher RC4-MD5 (128/128 bits))
(No client certificate requested)
by mx0.bitshelter.net (Postfix) with ESMTP id 6A0BD3FF4A
for [EMAIL PROTECTED]; Tue, 26 Jul 2005 20:45:39 +0200 (CEST)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Security: buffer-overrun in apache2-ssl
Date: Tue, 26 Jul 2005 20:45:35 +0200
User-Agent: KMail/1.8.1
X-Fingerprint: BBF9 60C6 892A A542 0006 B208 63F8 974C 8DC6 9FB4
X-PGP: 8DC69FB4
MIME-Version: 1.0
Content-Type: text/plain;
  charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.4 required=4.0 tests=BAYES_00,HAS_PACKAGE,
NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2005_01_02


Package: apache2
Version: 2.0.54-4
Severity:critical
Tags: security, fixed-upstream

There is a possible remote-exploitable buffer overrun in the Apache2 ssl 
implementation. A patch is available.

See
http://issues.apache.org/bugzilla/show_bug.cgi?id=35081
and
http://svn.apache.org/viewcvs?rev=189562view=rev

---
Received: (at 320048-close) by bugs.debian.org; 8 Sep 2005 18:21:33 +
From [EMAIL PROTECTED] Thu Sep 08 11:21:33 2005
Return-path: [EMAIL PROTECTED]
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1EDQxO-00065e-00; Thu, 08 Sep 2005 11:17:06 -0700
From: Adam Conrad [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#320048: fixed in apache2 2.0.54-5
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Thu, 08 Sep 2005 11:17:06 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: apache2
Source-Version: 2.0.54-5

We believe that the bug you reported is fixed in the latest version of
apache2, which is due to be installed in the Debian FTP archive:

apache2-common_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-common_2.0.54-5_i386.deb
apache2-doc_2.0.54-5_all.deb
  to pool/main/a/apache2/apache2-doc_2.0.54-5_all.deb
apache2-mpm-perchild_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-perchild_2.0.54-5_i386.deb
apache2-mpm-prefork_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-prefork_2.0.54-5_i386.deb
apache2-mpm-threadpool_2.0.54-5_all.deb
  to pool/main/a/apache2/apache2-mpm-threadpool_2.0.54-5_all.deb
apache2-mpm-worker_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-mpm-worker_2.0.54-5_i386.deb
apache2-prefork-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-prefork-dev_2.0.54-5_i386.deb
apache2-threaded-dev_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-threaded-dev_2.0.54-5_i386.deb
apache2-utils_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2-utils_2.0.54-5_i386.deb
apache2_2.0.54-5.diff.gz
  to pool/main/a/apache2/apache2_2.0.54-5.diff.gz
apache2_2.0.54-5.dsc
  to pool/main/a/apache2/apache2_2.0.54-5.dsc
apache2_2.0.54-5_i386.deb
  to pool/main/a/apache2/apache2_2.0.54-5_i386.deb
libapr0-dev_2.0.54-5_i386.deb
  to