Your message dated Sat, 08 Feb 2025 20:42:46 +0000
with message-id <[email protected]>
and subject line Bug#1082713: fixed in libapache-mod-jk 1:1.2.50-1
has caused the Debian Bug report #1082713,
regarding libapache-mod-jk: CVE-2024-46544
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1082713: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082713
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: libapache-mod-jk
Version: 1:1.2.49-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libapache-mod-jk.

CVE-2024-46544[0]:
| Incorrect Default Permissions vulnerability in Apache Tomcat
| Connectors allows local users to view and modify shared memory
| containing mod_jk configuration which may lead to information
| disclosure and/or denial of service.  This issue affects Apache
| Tomcat Connectors: from 1.2.9-beta through 1.2.49. Only mod_jk on
| Unix like systems is affected. Neither the ISAPI redirector nor
| mod_jk on Windows is affected.  Users are recommended to upgrade to
| version 1.2.50, which fixes the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-46544
    https://www.cve.org/CVERecord?id=CVE-2024-46544
[1] https://www.openwall.com/lists/oss-security/2024/09/23/1

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: libapache-mod-jk
Source-Version: 1:1.2.50-1
Done: Markus Koschany <[email protected]>

We believe that the bug you reported is fixed in the latest version of
libapache-mod-jk, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Koschany <[email protected]> (supplier of updated libapache-mod-jk package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 08 Feb 2025 20:59:37 +0100
Source: libapache-mod-jk
Architecture: source
Version: 1:1.2.50-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 
<[email protected]>
Changed-By: Markus Koschany <[email protected]>
Closes: 1082713 1094590
Changes:
 libapache-mod-jk (1:1.2.50-1) unstable; urgency=medium
 .
   * New upstream version 1.2.50. (Closes: #1094590)
     - Fix CVE-2024-46544:
       Incorrect default permissions for the memory mapped file configured by
       the JkShmFile directive on Unix like systems allows local users to view
       and/or modify the contents of the shared memory containing mod_jk
       configuration and status information. This could result in information
       disclosure and/or denial of service. (Closes: #1082713)
   * Declare compliance with Debian Policy 4.7.0.
Checksums-Sha1:
 7135c03c05e6fb8b6c520d1328e5243f62ee1973 2545 libapache-mod-jk_1.2.50-1.dsc
 4ba5bd5931d6305d4808e815b93cea924f101bd9 1738508 
libapache-mod-jk_1.2.50.orig.tar.gz
 859c219741f127d3a9e6ee612351741050474213 833 
libapache-mod-jk_1.2.50.orig.tar.gz.asc
 773d642a74899f6f2c961b6aae4dba0e2baba899 60888 
libapache-mod-jk_1.2.50-1.debian.tar.xz
 63a7c21ab7ffdd5bc840dec86dfdf75475b02bb3 12293 
libapache-mod-jk_1.2.50-1_amd64.buildinfo
Checksums-Sha256:
 411abdffe804ecd592578513b949e3dac8dd0a34827dce680cd8c067caf9a2f1 2545 
libapache-mod-jk_1.2.50-1.dsc
 c669727b432c729a4b9f4fa663991298222fc40bd8101b33350074bf5a444b03 1738508 
libapache-mod-jk_1.2.50.orig.tar.gz
 5299d27998b9307c187e207662830b07688e95ec47efb210033dc12b233ffbf3 833 
libapache-mod-jk_1.2.50.orig.tar.gz.asc
 fd649b49b213afcc60ac3e6af86cd7452d7f5b5d5c299011a590f458a3d0ae39 60888 
libapache-mod-jk_1.2.50-1.debian.tar.xz
 07aca10d9af2a7747ab2ebb174472fca768c6324e47763cdaaa2637f30359f03 12293 
libapache-mod-jk_1.2.50-1_amd64.buildinfo
Files:
 7d35916f011848bb8b7f2fac172a0577 2545 httpd optional 
libapache-mod-jk_1.2.50-1.dsc
 1335e7c14ca000620c1d827f8192c069 1738508 httpd optional 
libapache-mod-jk_1.2.50.orig.tar.gz
 c27eac9e9304e7b90bcd5ec98c6a38b5 833 httpd optional 
libapache-mod-jk_1.2.50.orig.tar.gz.asc
 1eaffe62768ec6c98e501988f2f91414 60888 httpd optional 
libapache-mod-jk_1.2.50-1.debian.tar.xz
 3e1ca1cf960d9e11b377223fc3ff141f 12293 httpd optional 
libapache-mod-jk_1.2.50-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=n5vJ
-----END PGP SIGNATURE-----

Attachment: pgpLxMfwPahT1.pgp
Description: PGP signature


--- End Message ---
__
This is the maintainer address of Debian's Java team
<https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-java-maintainers>.
 Please use
[email protected] for discussions and questions.

Reply via email to