You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by bu...@apache.org on 2019/08/15 06:03:15 UTC
svn commit: r1048745 - in /websites/staging/httpd/trunk/content: ./
security/vulnerabilities-httpd.xml security/vulnerabilities_24.html
Author: buildbot
Date: Thu Aug 15 06:03:15 2019
New Revision: 1048745
Log:
Staging update by buildbot for httpd
Modified:
websites/staging/httpd/trunk/content/ (props changed)
websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Thu Aug 15 06:03:15 2019
@@ -1 +1 @@
-1865204
+1865205
Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Thu Aug 15 06:03:15 2019
@@ -12,7 +12,7 @@
<acknowledgements>
The issue was discovered by Craig Young of Tripwire VERT, <vuln-report@secur3.us>.
</acknowledgements>
- <fixed base="2.4" version="2.4.40" date="20190814"/>
+ <fixed base="2.4" version="2.4.41" date="20190814"/>
<affects prod="httpd" version="2.4.39"/>
<affects prod="httpd" version="2.4.38"/>
<affects prod="httpd" version="2.4.37"/>
@@ -45,7 +45,7 @@
<acknowledgements>
The issue was discovered by Craig Young of Tripwire VERT, <vuln-report@secur3.us>.
</acknowledgements>
- <fixed base="2.4" version="2.4.40" date="20190814"/>
+ <fixed base="2.4" version="2.4.41" date="20190814"/>
<affects prod="httpd" version="2.4.39"/>
<affects prod="httpd" version="2.4.38"/>
<affects prod="httpd" version="2.4.37"/>
@@ -82,7 +82,7 @@
<acknowledgements>
This issue was reported by Matei "Mal" Badanoiu
</acknowledgements>
- <fixed base="2.4" version="2.4.40" date="20190814"/>
+ <fixed base="2.4" version="2.4.41" date="20190814"/>
<affects prod="httpd" version="2.4.38"/>
<affects prod="httpd" version="2.4.37"/>
<affects prod="httpd" version="2.4.35"/>
@@ -125,7 +125,7 @@
<acknowledgements>
The issue was discovered by Jonathan Looney of Netflix.
</acknowledgements>
- <fixed base="2.4" version="2.4.40" date="20190814"/>
+ <fixed base="2.4" version="2.4.41" date="20190814"/>
<affects prod="httpd" version="2.4.39"/>
<affects prod="httpd" version="2.4.38"/>
<affects prod="httpd" version="2.4.37"/>
Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Thu Aug 15 06:03:15 2019
@@ -107,8 +107,8 @@ the version with a question mark. </p><
in a "-dev" release then this means that a fix has been applied to
the development source tree and will be part of an upcoming full release.</p><p> Please send comments or corrections for
these vulnerabilities to the <a href="/security_report.html">Security
-Team</a>. </p><p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases. Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><br/><h1 id="2.4.40">
-Fixed in Apache httpd 2.4.40</h1><dl>
+Team</a>. </p><p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases. Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><br/><h1 id="2.4.41">
+Fixed in Apache httpd 2.4.41</h1><dl>
<dt>
<h3 id="CVE-2019-10092">low:
<name name="CVE-2019-10092">Limited cross-site scripting in mod_proxy error page</name>
@@ -251,8 +251,6 @@ Fixed in Apache httpd 2.4.40</h1><dl>
</tr>
</table>
</dd>
-</dl><br/><h1 id="2.4.41">
-Fixed in Apache httpd 2.4.41</h1><dl>
<dt>
<h3 id="CVE-2019-10097">moderate:
<name name="CVE-2019-10097">CVE-2019-10097 mod_remoteip: Stack buffer overflow and NULL pointer dereference</name>