Speaking of suggestions, may I please suggest closing a glaring security
hole in apr_dbd_mysql, per
https://bz.apache.org/bugzilla/show_bug.cgi?id=62342? I have provided
diffs for 1.5 -- because my organization uses RHEL 7, which uses APR 1.5
-- and 2.0 -- because someone on this list instructed me to do so. I'm
happy to do the same for 1.6.
We've been using this patch in production -- where every
server-to-server connection must be encrypted -- for several months and
it's working very well for us.
On 8/26/2018 10:18 PM, William A Rowe Jr wrote:
Let's take a few more days on this. We are getting more and more good
suggestions as git merge requests to girhub.com/apache/app
<http://girhub.com/apache/app> that are worth a look.
On Fri, Aug 24, 2018, 08:17 Eric Covener <cove...@gmail.com
<mailto:cove...@gmail.com>> wrote:
Starting a new thread as potential RM's may be filtering bugzilla
emails.
There are a lot of reports of PR62644 from solaris users of httpd, can
anyone RM?
--
Eric Covener
cove...@gmail.com <mailto:cove...@gmail.com>
--
This message has been scanned for viruses and
dangerous content by *MailScanner* <http://www.mailscanner.info/>, and is
believed to be clean.
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.