Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 08 Mar 2023 06:44:05 +0400
Source: apache2
Built-For-Profiles: nocheck
Architecture: source
Version: 2.4.56-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ap
apache2_2.4.56-1_sourceonly.changes uploaded successfully to localhost
along with the files:
apache2_2.4.56-1.dsc
apache2_2.4.56.orig.tar.gz
apache2_2.4.56.orig.tar.gz.asc
apache2_2.4.56-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Wed, 08 Mar 2023 03:19:22 +
with message-id
and subject line Bug#1032476: fixed in apache2 2.4.56-1
has caused the Debian Bug report #1032476,
regarding apache2: CVE-2023-25690 CVE-2023-27522
to be marked as done.
This means that you claim that the problem has been dealt wi
Processing control commands:
> tag -1 pending
Bug #1032476 [src:apache2] apache2: CVE-2023-25690 CVE-2023-27522
Added tag(s) pending.
--
1032476: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032476
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Thank you for your contribution to Debian.
Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 01 Mar 2023 15:22:18 +0100
Source: apr
Architecture: source
Version: 1.7.0-6+deb11u2
Distribution: bullseye-security
Urgency:
Source: apache2
Version: 2.4.55-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerabilities were published for apache2.
CVE-2023-25690[0]:
| Some mod_proxy configurations on Apache HTTP Server versions 2.4.0
| through 2.4.55
6 matches
Mail list logo