You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by mj...@apache.org on 2021/04/07 11:24:30 UTC
svn commit: r1888469 -
/httpd/site/trunk/content/security/json/CVE-2020-9490.json
Author: mjc
Date: Wed Apr 7 11:24:29 2021
New Revision: 1888469
URL: http://svn.apache.org/viewvc?rev=1888469&view=rev
Log:
Commit to cause rebuild
Modified:
httpd/site/trunk/content/security/json/CVE-2020-9490.json
Modified: httpd/site/trunk/content/security/json/CVE-2020-9490.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2020-9490.json?rev=1888469&r1=1888468&r2=1888469&view=diff
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2020-9490.json (original)
+++ httpd/site/trunk/content/security/json/CVE-2020-9490.json Wed Apr 7 11:24:29 2021
@@ -61,7 +61,7 @@
"description_data": [
{
"lang": "eng",
- "value": "In Apache HTTP Server versions 2.4.20 to 2.4.43 a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via \"H2Push off\" will mitigate this vulnerability for unpatched servers."
+ "value": "In Apache HTTP Server versions 2.4.20 to 2.4.43, a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via \"H2Push off\" will mitigate this vulnerability for unpatched servers."
}
]
},