New upstream 1.4.26, fixes CVE-2010-0295
Bug #521659 reported by
Stefan Bühler
This bug affects 4 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
lighttpd (Ubuntu) |
Fix Released
|
High
|
Andres Rodriguez | ||
Hardy |
Won't Fix
|
Undecided
|
Unassigned | ||
Jaunty |
Won't Fix
|
Undecided
|
Unassigned | ||
Karmic |
Won't Fix
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: lighttpd
New upstream package available, fixes a OOM/DoS vulnerability
- http://
- http://
I think it is a shame that neither the Ubuntu Security Team nor the ubuntu lighttpd maintainers saw this.
Related branches
visibility: | private → public |
Changed in lighttpd (Ubuntu): | |
status: | Confirmed → Triaged |
importance: | Medium → High |
Changed in lighttpd (Ubuntu): | |
status: | Triaged → In Progress |
assignee: | nobody → Andres Rodriguez (andreserl) |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res