You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by mj...@apache.org on 2021/04/07 11:24:30 UTC

svn commit: r1888469 - /httpd/site/trunk/content/security/json/CVE-2020-9490.json

Author: mjc
Date: Wed Apr  7 11:24:29 2021
New Revision: 1888469

URL: http://svn.apache.org/viewvc?rev=1888469&view=rev
Log:
Commit to cause rebuild

Modified:
    httpd/site/trunk/content/security/json/CVE-2020-9490.json

Modified: httpd/site/trunk/content/security/json/CVE-2020-9490.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2020-9490.json?rev=1888469&r1=1888468&r2=1888469&view=diff
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2020-9490.json (original)
+++ httpd/site/trunk/content/security/json/CVE-2020-9490.json Wed Apr  7 11:24:29 2021
@@ -61,7 +61,7 @@
     "description_data": [
       {
         "lang": "eng",
-        "value": "In Apache HTTP Server versions 2.4.20 to 2.4.43 a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via \"H2Push off\" will mitigate this vulnerability for unpatched servers."
+        "value": "In Apache HTTP Server versions 2.4.20 to 2.4.43, a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via \"H2Push off\" will mitigate this vulnerability for unpatched servers."
       }
     ]
   },