Summary: | net-www/apache-1.3: Buffer overflow in apache mod_proxy | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | apache-bugs |
Priority: | Highest | Flags: | jaervosz:
Assigned_To?
(jaervosz) |
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://www.guninski.com/modproxy1.html | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Sune Kloppenborg Jeppesen (RETIRED)
2004-06-10 10:22:33 UTC
The patch hasnt made it into upstream yet...still waiting. chuck Patch has been added and version bumped. Please have other arches test. web-apps herd should have to be notified about apache bugs. Thanks chuck x86 ppc sparc mips alpha hppa amd64 ia64: please mark stable Stable on alpha. Stable on sparc Stable on mips Stable on x86. Stable on hppa. GLSA is ready. ppc, amd64: please mark stable so it can go out :) Stable on ppc too Stable on amd64. Sorry for the delay. GLSA 200406-16 |