Your message dated Sat, 30 May 2009 15:33:42 +0000
with message-id <[email protected]>
and subject line Bug#523054: fixed in libapache-mod-jk 1:1.2.26-2.1
has caused the Debian Bug report #523054,
regarding libapache2-mod-jk: [SECURITY] CVE-2008-5519: Apache Tomcat mod_jk
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
523054: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523054
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libapache2-mod-jk
Version: 1:1.2.26-2
Severity: grave
Tags: security
Justification: user security hole

The Apache Tomcat Security Team has released the following advisory :

  Vulnerability announcement:
  CVE-2008-5519: Apache Tomcat mod_jk information disclosure vulnerability

  Severity: important

  Vendor: The Apache Software Foundation

  Versions Affected:
  mod_jk 1.2.0 to 1.2.26

  Description:
  Situations where faulty clients set Content-Length without providing
  data, or where a user submits repeated requests very quickly may permit
  one user to view the response associated with a different user's request.

  Mitigation:
  Upgrade to mod_jk 1.2.27 or later

  Example:
  See description

  Credit:
  This issue was discovered by the Red Hat Security Response Team

  References:
  http://tomcat.apache.org/security.html
  http://tomcat.apache.org/security-jk.html

-- 
Damien Raude-Morvan

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: libapache-mod-jk
Source-Version: 1:1.2.26-2.1

We believe that the bug you reported is fixed in the latest version of
libapache-mod-jk, which is due to be installed in the Debian FTP archive:

libapache-mod-jk-doc_1.2.26-2.1_all.deb
  to pool/main/liba/libapache-mod-jk/libapache-mod-jk-doc_1.2.26-2.1_all.deb
libapache-mod-jk_1.2.26-2.1.diff.gz
  to pool/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.26-2.1.diff.gz
libapache-mod-jk_1.2.26-2.1.dsc
  to pool/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.26-2.1.dsc
libapache2-mod-jk_1.2.26-2.1_i386.deb
  to pool/main/liba/libapache-mod-jk/libapache2-mod-jk_1.2.26-2.1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Stefan Fritsch <[email protected]> (supplier of updated libapache-mod-jk package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 30 May 2009 15:49:20 +0200
Source: libapache-mod-jk
Binary: libapache2-mod-jk libapache-mod-jk-doc
Architecture: source i386 all
Version: 1:1.2.26-2.1
Distribution: unstable
Urgency: high
Maintainer: Debian Java Maintainers 
<[email protected]>
Changed-By: Stefan Fritsch <[email protected]>
Description: 
 libapache-mod-jk-doc - Documentation of libapache2-mod-jk package
 libapache2-mod-jk - Apache 2 connector for the Tomcat Java servlet engine
Closes: 523054
Changes: 
 libapache-mod-jk (1:1.2.26-2.1) unstable; urgency=high
 .
   * Non-maintainer upload by the security-team.
   * CVE-2008-5519: Fix information disclosure vulnerability when clients
     abort connection before sending POST body (closes: #523054).
Checksums-Sha1: 
 4c90427862aed848218116355a89d2a39026dd14 1316 libapache-mod-jk_1.2.26-2.1.dsc
 6418f610c7b673e980d55add2182adb4462920ed 12303 
libapache-mod-jk_1.2.26-2.1.diff.gz
 6c121b29a6342c731815862c00fa537e1e184960 109712 
libapache2-mod-jk_1.2.26-2.1_i386.deb
 26d266d05adc28b977922b149020c643c1fd3c8a 174676 
libapache-mod-jk-doc_1.2.26-2.1_all.deb
Checksums-Sha256: 
 3e27e26f7818bad7d2a77d494131525bd8f1bd6034ba8d700207382c0c7d25d1 1316 
libapache-mod-jk_1.2.26-2.1.dsc
 b0a7849da9bdbbd9dce80555e53d216ad44cf933961404b67dd28a8c2b3afd01 12303 
libapache-mod-jk_1.2.26-2.1.diff.gz
 38194e2f73355397818f9bbb70932cccbe441285f3accd1f808ad3f96581b032 109712 
libapache2-mod-jk_1.2.26-2.1_i386.deb
 74f191cee92519b7ff13cb661c8b3b37572c4e69d418743b6c1928e7b76ca03c 174676 
libapache-mod-jk-doc_1.2.26-2.1_all.deb
Files: 
 517d6349b997afd1a23999a5e76dbd51 1316 web optional 
libapache-mod-jk_1.2.26-2.1.dsc
 f8ef641c2b6e349afcecabb9533369a1 12303 web optional 
libapache-mod-jk_1.2.26-2.1.diff.gz
 081f3cda134c3064cdecd818f73ec150 109712 web optional 
libapache2-mod-jk_1.2.26-2.1_i386.deb
 eb1db795a63b188a72fd253eebb2fd3e 174676 doc optional 
libapache-mod-jk-doc_1.2.26-2.1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKITzSbxelr8HyTqQRAgRAAJ41tGkz+998h5r3Ph9fvQ4VCmUbOQCglLbj
PPJVLoPaCkwusWUqOuA7AKw=
=GS3F
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to