Return-Path: Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: (qmail 62987 invoked from network); 30 May 2007 06:20:44 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 30 May 2007 06:20:44 -0000 Received: (qmail 7386 invoked by uid 500); 30 May 2007 06:20:47 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 6587 invoked by uid 500); 30 May 2007 06:20:45 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 6576 invoked by uid 99); 30 May 2007 06:20:45 -0000 Received: from herse.apache.org (HELO herse.apache.org) (140.211.11.133) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 29 May 2007 23:20:45 -0700 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (herse.apache.org: domain of chip@force-elite.com designates 66.225.25.189 as permitted sender) Received: from [66.225.25.189] (HELO utopia.in.force-elite.com) (66.225.25.189) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 29 May 2007 23:20:39 -0700 X-AuthUser: chip@force-elite.com Received: from Water-2.local (127.0.0.1:57067) by localhost with [XMail 1.17 (Linux/Ix86) ESMTP Server] id for from ; Tue, 29 May 2007 23:20:14 -0700 Message-ID: <465D1796.8040307@force-elite.com> Date: Tue, 29 May 2007 23:20:06 -0700 From: Paul Querna User-Agent: Thunderbird 2.0.0.0 (Macintosh/20070326) MIME-Version: 1.0 To: dev@httpd.apache.org Subject: Re: httpd 1.3 / 2.0 / 2.2 tags this weekend? References: <465D11FF.6030806@rowe-clan.net> In-Reply-To: <465D11FF.6030806@rowe-clan.net> X-Enigmail-Version: 0.95.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org William A. Rowe, Jr. wrote: > I'd like to see new tarballs rolled soonish, given the single significant > bug that was disclosed earlier today. > > Obviously most mass-vhosters are capable of compiling their own binary, > so providing the seperate-pid-table patch (whoever gets around to writing > one) resolves any immediate urgency. I don't believe its a critical security issue -- if you can run code on the server, as the server process, we can't defend against it. This seems to me like a battle line firmly in the scripting languages land. Anyways, until we have a patch that we can consider, I'm in no hurry. On APR{,-Util}: Likely a good idea anyways. -Paul