Package: lighttpd Version: 1.4.13-10 Severity: grave Tags: security Justification: user security hole
More details can be found at: http://www.lighttpd.net/assets/2007/4/13/lighttpd_sa2007_01.txt http://www.lighttpd.net/assets/2007/4/13/lighttpd_sa2007_02.txt Add'l release notes: http://www.lighttpd.net/download The CRLF security fix prevents a potential DOS attack, and has no known workaround. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.20.6-i386smp-ipt (SMP w/2 CPU cores) Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/bash Versions of packages lighttpd depends on: ii libattr1 1:2.4.32-1.1 Extended attribute shared library di libbz2-1.0 1.0.3-6 high-quality block-sorting file co di libc6 2.3.6.ds1-13 GNU C Library: Shared libraries ii libldap2 2.1.30-13.4 OpenLDAP libraries di libpcre3 6.7-1 Perl 5 Compatible Regular Expressi di libssl0.9.8 0.9.8c-4 SSL shared libraries ii lsb-base 3.1-23.1 Linux Standard Base 3.1 init scrip ii mime-support 3.39-1 MIME files 'mime.types' & 'mailcap di perl 5.8.8-7 Larry Wall's Practical Extraction di zlib1g 1:1.2.3-13 compression library - runtime Versions of packages lighttpd recommends: pn php4-cgi | php5-cgi <none> (no description available) -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]