Summary: | <www-servers/nginx-1.2.1 CVE-2011-4963 Vulnerabilities with Windows directory aliases | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Patrick Lauer <patrick> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | CC: | amd64, darkside, dev-zero, hollow |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://nginx.org/en/security_advisories.html | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Patrick Lauer
2012-06-06 08:50:38 UTC
I suspect these are the fixes for this issue. http://trac.nginx.org/nginx/changeset/4675/nginx http://trac.nginx.org/nginx/changeset/4676/nginx Do these affect nginx on linux? They appear Windows-specific...
> Do these affect nginx on linux? They appear Windows-specific...
Not clear to me either.
arches, please stabilize 1.2.1 x86 stable, thanks. 13:51 < ago> hello folks 13:51 < ago> CVE-2011-4963 is only windows specific or affect linux too? 13:52 < Seph> ago: only windows 13:52 < ago> Seph: great, thanks Mark it as invalid. |