You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by bu...@apache.org on 2019/08/15 08:55:09 UTC
svn commit: r1048760 - in /websites/staging/httpd/trunk/content: ./
security/vulnerabilities-httpd.xml security/vulnerabilities_24.html
Author: buildbot
Date: Thu Aug 15 08:55:09 2019
New Revision: 1048760
Log:
Staging update by buildbot for httpd
Modified:
websites/staging/httpd/trunk/content/ (props changed)
websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Thu Aug 15 08:55:09 2019
@@ -1 +1 @@
-1865207
+1865213
Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Thu Aug 15 08:55:09 2019
@@ -156,7 +156,7 @@ This vulnerability could only be trigger
by untrusted HTTP clients.</p>
</description>
<acknowledgements>
- The issue was discovered by Daniel McCarney <cpu@letsencrypt.org> Let's Encrypt / Internet Security Research Group (ISRG)@FIXME
+ The issue was discovered by Daniel McCarney <cpu@letsencrypt.org> Let's Encrypt / Internet Security Research Group (ISRG)
</acknowledgements>
<fixed base="2.4" version="2.4.41" date="20190814"/>
<affects prod="httpd" version="2.4.38"/>
Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Thu Aug 15 08:55:09 2019
@@ -298,7 +298,7 @@ could trigger a stack buffer overflow or
This vulnerability could only be triggered by a trusted proxy and not
by untrusted HTTP clients.</p>
<p>Acknowledgements:
- The issue was discovered by Daniel McCarney <cpu@letsencrypt.org> Let's Encrypt / Internet Security Research Group (ISRG)@FIXME
+ The issue was discovered by Daniel McCarney <cpu@letsencrypt.org> Let's Encrypt / Internet Security Research Group (ISRG)
</p>
<table class="cve">
<tr>