Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2480-3: request-tracker3.8 regression update

    Date 07 Jun 2012
    109
    Posted By LinuxSecurity Advisories
    The recent security updates for request-tracker3.8, DSA-2480-1 and DSA-2480-2, contained another regression when running under mod_perl. Please note that if you run request-tracker3.8 under the Apache web
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2480-3                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                            Florian Weimer
    June 07, 2012                          https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : request-tracker3.8
    Vulnerability  : regression
    Debian Bug     : 674924 675369
    
    The recent security updates for request-tracker3.8, DSA-2480-1 and
    DSA-2480-2, contained another regression when running under mod_perl.
    
    Please note that if you run request-tracker3.8 under the Apache web
    server, you must stop and start Apache manually.  The "restart"
    mechanism is not recommended, especially when using mod_perl.
    
    For the stable distribution (squeeze), this problem has been fixed in
    version 3.8.8-7+squeeze4.
    
    We recommend that you upgrade your request-tracker3.8 packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.