Bug#357561: privilege escalation hole
Package: apache
Followup-For: Bug #357561
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Why isn't anybody of the official maintainers reacting or commenting on
this bug? There are 3(!) completely undocumented downgrades of a bug,
that IMHO (from reading) fits the "grave" severity. Please react or comment,
when we can expect a fixed package or why this bug-severity can be downgraded
or the situation will become really annoying.
CCing debian-security
Regards, Daniel
- -- System Information:
Debian Release: 4.0
APT prefers unstable
APT policy: (850, 'unstable'), (700, 'testing'), (550, 'stable'), (110, 'experimental')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18.11
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Versions of packages apache depends on:
ii apache-common 1.3.34-4 support files for all Apache webse
ii debconf [debconf-2.0] 1.5.12 Debian configuration management sy
ii libc6 2.3.6.ds1-13 GNU C Library: Shared libraries
ii libdb4.4 4.4.20-8 Berkeley v4.4 Database Libraries [
ii libexpat1 1.95.8-3.4 XML parsing C library - runtime li
ii libmagic1 4.19-1 File type determination library us
ii logrotate 3.7.1-3 Log rotation utility
ii lsb-base 3.1-23 Linux Standard Base 3.1 init scrip
ii mime-support 3.39-1 MIME files 'mime.types' & 'mailcap
ii perl 5.8.8-7 Larry Wall's Practical Extraction
apache recommends no packages.
- -- debconf information excluded
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFF5kjym0bx+wiPa4wRAip3AJ9irtHP4T9E7haBQ/8P20FThEv2swCgjkkS
0oxBDO4ECfJu1ZflZoNsyOQ=
=rvc7
-----END PGP SIGNATURE-----
Reply to: