You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2002/07/01 11:23:01 UTC

DO NOT REPLY [Bug 10368] New: - security bug on apache 1.3.26 with Tru64 unix

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368

security bug on apache 1.3.26 with Tru64 unix

           Summary: security bug on apache 1.3.26 with Tru64 unix
           Product: Apache httpd-1.3
           Version: HEAD
          Platform: Alpha
        OS/Version: Other
            Status: NEW
          Severity: Critical
          Priority: Other
         Component: Auth/Access
        AssignedTo: bugs@httpd.apache.org
        ReportedBy: jeff@exlibris.co.il


It seems that the security bug (reported on bulletin on 17-June-2002) that was 
solved in 1.3.26 does NOT solve the problem for Tru64 unix. Can you confirm or 
deny that it was tested on Tru64 unix 4.0d and higher and 5.1?

Thanks,
Jeff

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org