You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by bu...@apache.org on 2019/08/15 08:55:09 UTC

svn commit: r1048760 - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_24.html

Author: buildbot
Date: Thu Aug 15 08:55:09 2019
New Revision: 1048760

Log:
Staging update by buildbot for httpd

Modified:
    websites/staging/httpd/trunk/content/   (props changed)
    websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
    websites/staging/httpd/trunk/content/security/vulnerabilities_24.html

Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Thu Aug 15 08:55:09 2019
@@ -1 +1 @@
-1865207
+1865213

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Thu Aug 15 08:55:09 2019
@@ -156,7 +156,7 @@ This vulnerability could only be trigger
 by untrusted HTTP clients.</p>
    </description>
    <acknowledgements>
-     The issue was discovered by Daniel McCarney &lt;cpu@letsencrypt.org&gt; Let's Encrypt / Internet Security Research Group (ISRG)@FIXME
+     The issue was discovered by Daniel McCarney &lt;cpu@letsencrypt.org&gt; Let's Encrypt / Internet Security Research Group (ISRG)
    </acknowledgements>
    <fixed base="2.4" version="2.4.41" date="20190814"/>
    <affects prod="httpd" version="2.4.38"/>

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Thu Aug 15 08:55:09 2019
@@ -298,7 +298,7 @@ could trigger a stack buffer overflow or
 This vulnerability could only be triggered by a trusted proxy and not
 by untrusted HTTP clients.</p>
     <p>Acknowledgements: 
-     The issue was discovered by Daniel McCarney &lt;cpu@letsencrypt.org&gt; Let's Encrypt / Internet Security Research Group (ISRG)@FIXME
+     The issue was discovered by Daniel McCarney &lt;cpu@letsencrypt.org&gt; Let's Encrypt / Internet Security Research Group (ISRG)
    </p>
     <table class="cve">
       <tr>