You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by wr...@apache.org on 2016/12/21 18:24:30 UTC

svn commit: r1775525 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml

Author: wrowe
Date: Wed Dec 21 18:24:30 2016
New Revision: 1775525

URL: http://svn.apache.org/viewvc?rev=1775525&view=rev
Log:
Assign severities based on sec team discussion

Modified:
    httpd/site/trunk/content/security/vulnerabilities-httpd.xml

Modified: httpd/site/trunk/content/security/vulnerabilities-httpd.xml
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/vulnerabilities-httpd.xml?rev=1775525&r1=1775524&r2=1775525&view=diff
==============================================================================
--- httpd/site/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ httpd/site/trunk/content/security/vulnerabilities-httpd.xml Wed Dec 21 18:24:30 2016
@@ -2,7 +2,7 @@
 
 <issue fixed="2.4.25" reported="20160210" public="20161220" released="20161220">
 <cve name="CVE-2016-8743"/>
-<severity level="0">TBD</severity>
+<severity level="2">important</severity>
 <title>Apache HTTP Request Parsing Whitespace Defects</title>
 <description><p>
 Apache HTTP Server, prior to release 2.4.25, accepted a broad pattern of 
@@ -100,7 +100,7 @@ as well as RĂ©gis Leroy for each repor
 
 <issue fixed="2.4.25" reported="20161122" public="20161204" released="20161220">
 <cve name="CVE-2016-8740"/>
-<severity level="0">n/a</severity>
+<severity level="4">low</severity>
 <title>HTTP/2 CONTINUATION denial of service</title>
 <description><p>
   The HTTP/2 protocol implementation (mod_http2) had an incomplete handling
@@ -136,6 +136,10 @@ and CDF/SEFCOM at Arizona State Universi
   <a href="https://www.apache.org/security/asf-httpoxy-response.txt"
      >https://www.apache.org/security/asf-httpoxy-response.txt</a>
   and incorporated in the 2.4.25 release.
+</p><p>  
+  Note: This is not assigned an httpd severity, as it is a defect in
+  other software which overloaded well-established CGI environment
+  variables, and does not reflect an error in HTTP server software.
 </p></description>
 <acknowledgements>
 We would like to thank Dominic Scheirlinck and Scott Geary of Vend