modsecurity-apache: CVE-2013-2765: NULL pointer dereference

Related Vulnerabilities: CVE-2013-2765  

Debian Bug report logs - #710217
modsecurity-apache: CVE-2013-2765: NULL pointer dereference

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Wed, 29 May 2013 07:21:01 UTC

Severity: grave

Tags: patch, security, upstream

Fixed in versions modsecurity-apache/2.6.6-9, modsecurity-apache/2.6.6-6+deb7u1, libapache-mod-security/2.5.12-1+squeeze3

Done: Alberto Gonzalez Iniesta <agi@inittab.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Alberto Gonzalez Iniesta <agi@inittab.org>:
Bug#710217; Package modsecurity-apache. (Wed, 29 May 2013 07:21:05 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Alberto Gonzalez Iniesta <agi@inittab.org>. (Wed, 29 May 2013 07:21:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: modsecurity-apache: CVE-2013-2765: NULL pointer dereference
Date: Wed, 29 May 2013 09:17:26 +0200
Package: modsecurity-apache
Severity: grave
Tags: security upstream patch

Hi,

the following vulnerability was published for modsecurity-apache.

CVE-2013-2765[0]:
NULL pointer dereference

Upstream patch is at [1], fixed in 2.7.4[2].

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765
    http://security-tracker.debian.org/tracker/CVE-2013-2765
[1] https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba
[2] https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Alberto Gonzalez Iniesta <agi@inittab.org>:
Bug#710217; Package modsecurity-apache. (Tue, 04 Jun 2013 04:54:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Alberto Gonzalez Iniesta <agi@inittab.org>. (Tue, 04 Jun 2013 04:54:04 GMT) (full text, mbox, link).


Message #10 received at 710217@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 710217@bugs.debian.org
Subject: Re: Bug#710217: modsecurity-apache: CVE-2013-2765: NULL pointer dereference
Date: Tue, 4 Jun 2013 06:50:50 +0200
Hi Alberto

On Wed, May 29, 2013 at 09:17:26AM +0200, Salvatore Bonaccorso wrote:
> the following vulnerability was published for modsecurity-apache.
> 
> CVE-2013-2765[0]:
> NULL pointer dereference
> 
> Upstream patch is at [1], fixed in 2.7.4[2].
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765
>     http://security-tracker.debian.org/tracker/CVE-2013-2765
> [1] https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba
> [2] https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES
> 
> Please adjust the affected versions in the BTS as needed.

Did you had a chance to already look at the upload for unstable? Can
you also contact the Stable Release Managers for asking then for the
inclusion in the next point release? (Note that the freeze for the NEW
queue for it is already the coming weekend).

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#710217; Package modsecurity-apache. (Tue, 04 Jun 2013 07:48:03 GMT) (full text, mbox, link).


Acknowledgement sent to Alberto Gonzalez Iniesta <agi@inittab.org>:
Extra info received and forwarded to list. (Tue, 04 Jun 2013 07:48:04 GMT) (full text, mbox, link).


Message #15 received at 710217@bugs.debian.org (full text, mbox, reply):

From: Alberto Gonzalez Iniesta <agi@inittab.org>
To: Salvatore Bonaccorso <carnil@debian.org>, 710217@bugs.debian.org
Subject: Re: Bug#710217: modsecurity-apache: CVE-2013-2765: NULL pointer dereference
Date: Tue, 4 Jun 2013 09:38:58 +0200
On Tue, Jun 04, 2013 at 06:50:50AM +0200, Salvatore Bonaccorso wrote:
> Hi Alberto
> 
> On Wed, May 29, 2013 at 09:17:26AM +0200, Salvatore Bonaccorso wrote:
> > the following vulnerability was published for modsecurity-apache.
> > 
> > CVE-2013-2765[0]:
> > NULL pointer dereference
> > 
> > Upstream patch is at [1], fixed in 2.7.4[2].
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > 
> > For further information see:
> > 
> > [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765
> >     http://security-tracker.debian.org/tracker/CVE-2013-2765
> > [1] https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba
> > [2] https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES
> > 
> > Please adjust the affected versions in the BTS as needed.
> 
> Did you had a chance to already look at the upload for unstable? Can
> you also contact the Stable Release Managers for asking then for the
> inclusion in the next point release? (Note that the freeze for the NEW
> queue for it is already the coming weekend).

Hi Salvatore,

I was the AFK all the weekend, I'm preparing the upload to unstable now,
and will contact SRM afterwards.

Thanks,

Alberto



-- 
Alberto Gonzalez Iniesta    | Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred    | http://inittab.com

Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D  4BF2 009B 3375 6B9A AA55



Reply sent to Alberto Gonzalez Iniesta <agi@inittab.org>:
You have taken responsibility. (Tue, 04 Jun 2013 07:51:08 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Tue, 04 Jun 2013 07:51:08 GMT) (full text, mbox, link).


Message #20 received at 710217-close@bugs.debian.org (full text, mbox, reply):

From: Alberto Gonzalez Iniesta <agi@inittab.org>
To: 710217-close@bugs.debian.org
Subject: Bug#710217: fixed in modsecurity-apache 2.6.6-9
Date: Tue, 04 Jun 2013 07:48:10 +0000
Source: modsecurity-apache
Source-Version: 2.6.6-9

We believe that the bug you reported is fixed in the latest version of
modsecurity-apache, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 710217@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <agi@inittab.org> (supplier of updated modsecurity-apache package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 04 Jun 2013 09:34:41 +0200
Source: modsecurity-apache
Binary: libapache2-modsecurity libapache-mod-security
Architecture: source amd64 all
Version: 2.6.6-9
Distribution: unstable
Urgency: high
Maintainer: Alberto Gonzalez Iniesta <agi@inittab.org>
Changed-By: Alberto Gonzalez Iniesta <agi@inittab.org>
Description: 
 libapache-mod-security - Dummy transitional package
 libapache2-modsecurity - Tighten web applications security for Apache
Closes: 710217
Changes: 
 modsecurity-apache (2.6.6-9) unstable; urgency=high
 .
   * Applied upstream patch to fix NULL pointer dereference.
     CVE-2013-2765. (Closes: #710217)
Checksums-Sha1: 
 a8adfd31fdfc42321e4064c23530f732173eb9e2 1962 modsecurity-apache_2.6.6-9.dsc
 e8b160f1147f32c0e1ce92b4b9e6a7118442f12a 10620 modsecurity-apache_2.6.6-9.debian.tar.gz
 b34e655e33336b2dfafa0fa5a5de03b7ccb05efa 303016 libapache2-modsecurity_2.6.6-9_amd64.deb
 0d6acb37bee2a8e5231d12e25d9385c32f70b574 18564 libapache-mod-security_2.6.6-9_all.deb
Checksums-Sha256: 
 256bfd2c3903aae3392b399ed0115f27a37fd86365fad60a5a2a335663f3b506 1962 modsecurity-apache_2.6.6-9.dsc
 b09a1317c241bd15972f18bc2054b2a9893c18b54e1a70a3216f1dfc0ac99f9b 10620 modsecurity-apache_2.6.6-9.debian.tar.gz
 e00caf0384be44c13b6262c1d4abdb51e4d528d112da7d18823af4652e221dac 303016 libapache2-modsecurity_2.6.6-9_amd64.deb
 935ee9669c37e03debc92fad048fdf5f1e264a004af625cf2a9131625330e3a3 18564 libapache-mod-security_2.6.6-9_all.deb
Files: 
 3401772bbf8a8255ac9392303dbb8dcd 1962 httpd optional modsecurity-apache_2.6.6-9.dsc
 42b5532568b554dee169c24fa91d8c41 10620 httpd optional modsecurity-apache_2.6.6-9.debian.tar.gz
 76dc5c63ca5b663d5b16d642640934d0 303016 httpd optional libapache2-modsecurity_2.6.6-9_amd64.deb
 e668abf68b3fa029f79e3df231bf71f6 18564 oldlibs extra libapache-mod-security_2.6.6-9_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBCAAGBQJRrZmYAAoJEACbM3VrmqpVk8UP/2ytC4Rzo0ryHbM7Xc90N5gn
5FU6ctp2+3QH0pI+kuvxq9or67YxVa33ucfDSut9KkLTQlXkPGL7uPvxKLzjyzsS
46VdmiEJk//XvCBfwNn6WgJg9vq6ZwUm+4HQGNE+oENFUhz7bpw7nUk/s1yA+WuQ
+D6RR+H7dk88CIvkLAotsgfv0vtXN65Fmk63r+evxhRwmHjoLyv3IiLyRufMuntM
0pfk9F1ggypORfrF9ylwzG9ZSymaHcM9a3XwhIHZ/2463hIDEkVKTRHVPfYEZCB4
jlHakEazDaBtakb/SwTv6Opo8jeFpy56+c8AkvhWfZt34+J0RQgypHN5nsRuo3DF
F2SgGWjEufPzmn3qCudxh/IJDBiP+GRo5Ex+yjHpnreoMoQOpbvuE2E3jSfqg7cs
dqKZ05+dyLVvt+zOS6Lq5z3HQa6pC0eEthfnrjbbaCkJr/tfhG9xSRBWNz/LL+IN
msEFc3FJIteTFHZajinQZPUZyH0t/jLYtC6cMD6RJFueBZGEtFj9pKccmocpegju
dWBLSacmkY+wMHytQNb9kbtLuh4jKnjYtZOZkXu8/0IOPDbaauP8NfDTmh8awyzE
LuS96O+K59Cx9IEUy78Q/FvIbN9EjfG7q0DqLrGIs8UALaNTiYP7Qpt8+jyl7/lR
WelY0etZPcGC2FZ8ebVs
=stRf
-----END PGP SIGNATURE-----




Information forwarded to debian-bugs-dist@lists.debian.org, Alberto Gonzalez Iniesta <agi@inittab.org>:
Bug#710217; Package modsecurity-apache. (Tue, 04 Jun 2013 11:51:28 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Alberto Gonzalez Iniesta <agi@inittab.org>. (Tue, 04 Jun 2013 11:51:28 GMT) (full text, mbox, link).


Message #25 received at 710217@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Alberto Gonzalez Iniesta <agi@inittab.org>
Cc: 710217@bugs.debian.org
Subject: Re: Bug#710217: modsecurity-apache: CVE-2013-2765: NULL pointer dereference
Date: Tue, 4 Jun 2013 13:41:35 +0200
Hi Alberto,

On Tue, Jun 04, 2013 at 09:38:58AM +0200, Alberto Gonzalez Iniesta wrote:
> On Tue, Jun 04, 2013 at 06:50:50AM +0200, Salvatore Bonaccorso wrote:
> > Hi Alberto
> > 
> > On Wed, May 29, 2013 at 09:17:26AM +0200, Salvatore Bonaccorso wrote:
> > > the following vulnerability was published for modsecurity-apache.
> > > 
> > > CVE-2013-2765[0]:
> > > NULL pointer dereference
> > > 
> > > Upstream patch is at [1], fixed in 2.7.4[2].
> > > 
> > > If you fix the vulnerability please also make sure to include the
> > > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > > 
> > > For further information see:
> > > 
> > > [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765
> > >     http://security-tracker.debian.org/tracker/CVE-2013-2765
> > > [1] https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba
> > > [2] https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES
> > > 
> > > Please adjust the affected versions in the BTS as needed.
> > 
> > Did you had a chance to already look at the upload for unstable? Can
> > you also contact the Stable Release Managers for asking then for the
> > inclusion in the next point release? (Note that the freeze for the NEW
> > queue for it is already the coming weekend).
> 
> Hi Salvatore,
> 
> I was the AFK all the weekend, I'm preparing the upload to unstable now,
> and will contact SRM afterwards.

Thanks!

Regards,
Salvatore



Reply sent to Alberto Gonzalez Iniesta <agi@inittab.org>:
You have taken responsibility. (Thu, 06 Jun 2013 18:51:24 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Thu, 06 Jun 2013 18:51:24 GMT) (full text, mbox, link).


Message #30 received at 710217-close@bugs.debian.org (full text, mbox, reply):

From: Alberto Gonzalez Iniesta <agi@inittab.org>
To: 710217-close@bugs.debian.org
Subject: Bug#710217: fixed in modsecurity-apache 2.6.6-6+deb7u1
Date: Thu, 06 Jun 2013 18:47:05 +0000
Source: modsecurity-apache
Source-Version: 2.6.6-6+deb7u1

We believe that the bug you reported is fixed in the latest version of
modsecurity-apache, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 710217@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <agi@inittab.org> (supplier of updated modsecurity-apache package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 29 May 2013 09:40:00 +0000
Source: modsecurity-apache
Binary: libapache2-modsecurity libapache-mod-security
Architecture: source amd64 all
Version: 2.6.6-6+deb7u1
Distribution: wheezy
Urgency: low
Maintainer: Alberto Gonzalez Iniesta <agi@inittab.org>
Changed-By: Alberto Gonzalez Iniesta <agi@inittab.org>
Description: 
 libapache-mod-security - Dummy transitional package
 libapache2-modsecurity - Tighten web applications security for Apache
Closes: 710217
Changes: 
 modsecurity-apache (2.6.6-6+deb7u1) wheezy; urgency=low
 .
   * Applied upstream patch to fix NULL pointer dereference.
     CVE-2013-2765. (Closes: #710217)
Checksums-Sha1: 
 037b35175410aaf0ee7991f8bd2b48c3f6e4aea0 2020 modsecurity-apache_2.6.6-6+deb7u1.dsc
 18f3eba967d60abfe117e0e7866b68f763da711f 781984 modsecurity-apache_2.6.6.orig.tar.gz
 85f6d86ce823f0a0d495f39b972d89668fb1c036 10894 modsecurity-apache_2.6.6-6+deb7u1.debian.tar.gz
 71a0693182159ad78fe757517c5aa8aaa27ed7b2 303634 libapache2-modsecurity_2.6.6-6+deb7u1_amd64.deb
 4365fd3bee57db2cc818a508e9414abea880b958 18446 libapache-mod-security_2.6.6-6+deb7u1_all.deb
Checksums-Sha256: 
 ee1178f0f6aba375faf345c2c723235b6d2309993340fbafb9eee65d2068f2eb 2020 modsecurity-apache_2.6.6-6+deb7u1.dsc
 a0cb075d5898230d17da5805eb102d1bbba07fe0748dcc32920990c4711b7708 781984 modsecurity-apache_2.6.6.orig.tar.gz
 fa537b2fca5a82c4d122970b85086e80e3feec686794b8ad8a487efe64ad6aac 10894 modsecurity-apache_2.6.6-6+deb7u1.debian.tar.gz
 c3ece6b07c385aeec200bb4979edb3b440dc0e5673fc911140709cb7bc22ec6a 303634 libapache2-modsecurity_2.6.6-6+deb7u1_amd64.deb
 3af1b0691e0e371467d7933af12a0f93e2881e42e7f440b39d1f7b74009d2cc0 18446 libapache-mod-security_2.6.6-6+deb7u1_all.deb
Files: 
 f5fe562b828ea5c57b5db0df7421031f 2020 httpd optional modsecurity-apache_2.6.6-6+deb7u1.dsc
 bc2ebcf326589c67fb6b53f630768c4e 781984 httpd optional modsecurity-apache_2.6.6.orig.tar.gz
 ea228b41b313d88290cd82a5914b5c23 10894 httpd optional modsecurity-apache_2.6.6-6+deb7u1.debian.tar.gz
 4caf2b45ce0994bb0e377f3a4394a330 303634 httpd optional libapache2-modsecurity_2.6.6-6+deb7u1_amd64.deb
 5e9b8b80df11d08aa20dc5f0e73cc6b4 18446 oldlibs extra libapache-mod-security_2.6.6-6+deb7u1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=KTyD
-----END PGP SIGNATURE-----




Reply sent to Alberto Gonzalez Iniesta <agi@inittab.org>:
You have taken responsibility. (Thu, 06 Jun 2013 19:36:41 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Thu, 06 Jun 2013 19:36:41 GMT) (full text, mbox, link).


Message #35 received at 710217-close@bugs.debian.org (full text, mbox, reply):

From: Alberto Gonzalez Iniesta <agi@inittab.org>
To: 710217-close@bugs.debian.org
Subject: Bug#710217: fixed in libapache-mod-security 2.5.12-1+squeeze3
Date: Thu, 06 Jun 2013 19:32:23 +0000
Source: libapache-mod-security
Source-Version: 2.5.12-1+squeeze3

We believe that the bug you reported is fixed in the latest version of
libapache-mod-security, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 710217@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <agi@inittab.org> (supplier of updated libapache-mod-security package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 04 Jun 2013 10:14:45 +0000
Source: libapache-mod-security
Binary: libapache-mod-security mod-security-common
Architecture: source all amd64
Version: 2.5.12-1+squeeze3
Distribution: squeeze
Urgency: low
Maintainer: Alberto Gonzalez Iniesta <agi@inittab.org>
Changed-By: Alberto Gonzalez Iniesta <agi@inittab.org>
Description: 
 libapache-mod-security - Tighten web applications security for Apache
 mod-security-common - Tighten web applications security - common files
Closes: 710217
Changes: 
 libapache-mod-security (2.5.12-1+squeeze3) squeeze; urgency=low
 .
   * Applied upstream patch to fix NULL pointer dereference.
     CVE-2013-2765. (Closes: #710217)
Checksums-Sha1: 
 c02fcdb627b98b5a4f15a7e23362092afdc7e69b 1923 libapache-mod-security_2.5.12-1+squeeze3.dsc
 eb2068e5d31525fa53769dabd1a1c65896fd4e76 1392209 libapache-mod-security_2.5.12.orig.tar.gz
 eadf51d57f13f9cf37c012aa7812c37f6137a59b 10946 libapache-mod-security_2.5.12-1+squeeze3.debian.tar.gz
 0ae1b1e91963ff502e81731b6064db02fb7c5cfb 959788 mod-security-common_2.5.12-1+squeeze3_all.deb
 0ee7717da678a00b6097605c20d7ae30aff80244 122804 libapache-mod-security_2.5.12-1+squeeze3_amd64.deb
Checksums-Sha256: 
 36c9e48a81fc7b9e02e2a5d3e551e92e514b16bde216450aad89fcf5e4dc2175 1923 libapache-mod-security_2.5.12-1+squeeze3.dsc
 168bb6591a0f9665169e0ed223a00d63a1c87e11d1e56388abcf431f30efaa84 1392209 libapache-mod-security_2.5.12.orig.tar.gz
 a00247fb963c8962f4fc7fc8f821e4b0a169381422081e2c7682cf84c3099b22 10946 libapache-mod-security_2.5.12-1+squeeze3.debian.tar.gz
 b344af0d441e9a154e241f5596e85a0b649b3db760f676c42e565befae992d1c 959788 mod-security-common_2.5.12-1+squeeze3_all.deb
 2ea910dc31638b9fa7d3ba3dc5b5b09f0bcf7815a0b1eb90bc9711bc137135ec 122804 libapache-mod-security_2.5.12-1+squeeze3_amd64.deb
Files: 
 87202487f73f22e93ae998b6c5e8df95 1923 httpd optional libapache-mod-security_2.5.12-1+squeeze3.dsc
 f7d14b97bbe54ecb953125b0f9b87a24 1392209 httpd optional libapache-mod-security_2.5.12.orig.tar.gz
 052554b0ea1a44e80052f15e29f1388f 10946 httpd optional libapache-mod-security_2.5.12-1+squeeze3.debian.tar.gz
 c4f30996a9af73dad1be5afc88204992 959788 httpd optional mod-security-common_2.5.12-1+squeeze3_all.deb
 e53506c735fd6ebeb2d7ed549d5df450 122804 httpd optional libapache-mod-security_2.5.12-1+squeeze3_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=8b6i
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 14 Jul 2013 07:28:16 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:46:40 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.