You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2002/07/01 11:23:01 UTC
DO NOT REPLY [Bug 10368] New: -
security bug on apache 1.3.26 with Tru64 unix
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368
security bug on apache 1.3.26 with Tru64 unix
Summary: security bug on apache 1.3.26 with Tru64 unix
Product: Apache httpd-1.3
Version: HEAD
Platform: Alpha
OS/Version: Other
Status: NEW
Severity: Critical
Priority: Other
Component: Auth/Access
AssignedTo: bugs@httpd.apache.org
ReportedBy: jeff@exlibris.co.il
It seems that the security bug (reported on bulletin on 17-June-2002) that was
solved in 1.3.26 does NOT solve the problem for Tru64 unix. Can you confirm or
deny that it was tested on Tru64 unix 4.0d and higher and 5.1?
Thanks,
Jeff
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org