Your message dated Wed, 22 Aug 2007 07:57:12 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#425836: fixed in libapache-mod-jk 1:1.2.5-2sarge1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: libapache2-mod-jk
Version: 1:1.2.22-1
Severity: grave
Tags: security
As stated at http://tomcat.apache.org/connectors-doc/ the 1.2.22
version of jk connector is affected from CVE-2007-1860
Please provide the 1.2.23 version.
Regards
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (990, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.18-4-686 (SMP w/2 CPU cores)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
--
---------------------------------------------------------------------
| Marco Nenciarini | Debian/GNU Linux Developer - Plug Member |
| [EMAIL PROTECTED] | http://www.prato.linux.it/~mnencia |
---------------------------------------------------------------------
Key fingerprint = FED9 69C7 9E67 21F5 7D95 5270 6864 730D F095 E5E4
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Source: libapache-mod-jk
Source-Version: 1:1.2.5-2sarge1
We believe that the bug you reported is fixed in the latest version of
libapache-mod-jk, which is due to be installed in the Debian FTP archive:
libapache-mod-jk_1.2.5-2sarge1.diff.gz
to pool/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.5-2sarge1.diff.gz
libapache-mod-jk_1.2.5-2sarge1.dsc
to pool/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.5-2sarge1.dsc
libapache-mod-jk_1.2.5-2sarge1_i386.deb
to pool/main/liba/libapache-mod-jk/libapache-mod-jk_1.2.5-2sarge1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Koch <[EMAIL PROTECTED]> (supplier of updated libapache-mod-jk package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Thu, 7 Jun 2007 00:03:29 +0200
Source: libapache-mod-jk
Binary: libapache-mod-jk
Architecture: source i386
Version: 1:1.2.5-2sarge1
Distribution: oldstable-security
Urgency: high
Maintainer: Debian Java Maintainers
<[email protected]>
Changed-By: Michael Koch <[EMAIL PROTECTED]>
Description:
libapache-mod-jk - Apache 1.3 connector for the Tomcat Java servlet engine
Closes: 425836
Changes:
libapache-mod-jk (1:1.2.5-2sarge1) oldstable-security; urgency=high
.
* Forward unparsed URI to tomcat. Closes: #425836.
CVE-2007-1860
Files:
2d534b789de9c9deae580cc363d3ba63 746 web optional
libapache-mod-jk_1.2.5-2sarge1.dsc
ea70064664cba04079f64804314cfed1 3940 web optional
libapache-mod-jk_1.2.5-2sarge1.diff.gz
bfa43eb7a19f0ee9e90ce288784639c9 179762 web optional
libapache-mod-jk_1.2.5-2sarge1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGqgFShuANDBmkLRkRApPiAKCO5xQcRqMDAJjHPGWsKzMCKby+RgCaAygv
SQTEeMVR1RfeYMH9SZuzKiA=
=Psu9
-----END PGP SIGNATURE-----
--- End Message ---
_______________________________________________
pkg-java-maintainers mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/pkg-java-maintainers