Speaking of suggestions, may I please suggest closing a glaring security hole in apr_dbd_mysql, per https://bz.apache.org/bugzilla/show_bug.cgi?id=62342? I have provided diffs for 1.5 -- because my organization uses RHEL 7, which uses APR 1.5 -- and 2.0 -- because someone on this list instructed me to do so.  I'm happy to do the same for 1.6.

We've been using this patch in production -- where every server-to-server connection must be encrypted -- for several months and it's working very well for us.


On 8/26/2018 10:18 PM, William A Rowe Jr wrote:
Let's take a few more days on this. We are getting more and more good suggestions as git merge requests to girhub.com/apache/app <http://girhub.com/apache/app> that are worth a look.

On Fri, Aug 24, 2018, 08:17 Eric Covener <cove...@gmail.com <mailto:cove...@gmail.com>> wrote:

    Starting a new thread as potential RM's may be filtering bugzilla
    emails.

    There are a lot of reports of PR62644 from solaris users of httpd, can
    anyone RM?

-- Eric Covener
    cove...@gmail.com <mailto:cove...@gmail.com>


--
This message has been scanned for viruses and
dangerous content by *MailScanner* <http://www.mailscanner.info/>, and is
believed to be clean.


--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

Reply via email to