From: Stefan Fritsch Date: Wed, 30 Mar 2016 21:14:26 +0000 (+0000) Subject: vote+comment X-Git-Tag: 2.4.20~19 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=c676a2cc72625b0e9b86338b7f088b569d5b0ee1;p=thirdparty%2Fapache%2Fhttpd.git vote+comment git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1737164 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/STATUS b/STATUS index 828237c02a8..4bfa6f74a37 100644 --- a/STATUS +++ b/STATUS @@ -136,10 +136,12 @@ PATCHES PROPOSED TO BACKPORT FROM TRUNK: unadulterated in 64 bit versions of Windows. PR 46751. trunk patch: http://svn.apache.org/r1705217 2.4.x patch: trunk patch works - +1: jailletc36 + +1: jailletc36, sf ylavic: As asked on dev@ (in reply to r1705217), what about CVE-2014-6271 (shellshock) with unix-like shells (or even maybe native windows ones too)? + sf: I think if there were such shells they should be fixed by now. And + these names with ( ) are quite common under windows. *) mod_ssl: Add "no_crl_for_cert_ok" flag to SSLCARevocationCheck directive to opt-in previous behaviour (2.2) with CRLs verification when checking