[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#357561: privilege escalation hole



Package: apache
Followup-For: Bug #357561

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Why isn't anybody of the official maintainers reacting or commenting on
this bug? There are 3(!) completely undocumented downgrades of a bug,
that IMHO (from reading) fits the "grave" severity. Please react or comment,
when we can expect a fixed package or why this bug-severity can be downgraded
or the situation will become really annoying.

CCing debian-security

Regards, Daniel

- -- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (850, 'unstable'), (700, 'testing'), (550, 'stable'), (110, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18.11
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)

Versions of packages apache depends on:
ii  apache-common               1.3.34-4     support files for all Apache webse
ii  debconf [debconf-2.0]       1.5.12       Debian configuration management sy
ii  libc6                       2.3.6.ds1-13 GNU C Library: Shared libraries
ii  libdb4.4                    4.4.20-8     Berkeley v4.4 Database Libraries [
ii  libexpat1                   1.95.8-3.4   XML parsing C library - runtime li
ii  libmagic1                   4.19-1       File type determination library us
ii  logrotate                   3.7.1-3      Log rotation utility
ii  lsb-base                    3.1-23       Linux Standard Base 3.1 init scrip
ii  mime-support                3.39-1       MIME files 'mime.types' & 'mailcap
ii  perl                        5.8.8-7      Larry Wall's Practical Extraction 

apache recommends no packages.

- -- debconf information excluded

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFF5kjym0bx+wiPa4wRAip3AJ9irtHP4T9E7haBQ/8P20FThEv2swCgjkkS
0oxBDO4ECfJu1ZflZoNsyOQ=
=rvc7
-----END PGP SIGNATURE-----



Reply to: