Return-Path: Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org Received: (qmail 70748 invoked by uid 500); 19 Apr 2002 19:30:29 -0000 Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list cvs@httpd.apache.org Received: (qmail 70737 invoked by uid 500); 19 Apr 2002 19:30:29 -0000 Delivered-To: apmail-apache-1.3-cvs@apache.org Date: 19 Apr 2002 19:30:32 -0000 Message-ID: <20020419193032.53260.qmail@icarus.apache.org> From: stoddard@apache.org To: apache-1.3-cvs@apache.org Subject: cvs commit: apache-1.3/src CHANGES X-Spam-Rating: daedalus.apache.org 1.6.2 0/1000/N stoddard 02/04/19 12:30:32 Modified: src CHANGES Log: More notes... Revision Changes Path 1.1811 +1 -1 apache-1.3/src/CHANGES Index: CHANGES =================================================================== RCS file: /home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.1810 retrieving revision 1.1811 diff -u -r1.1810 -r1.1811 --- CHANGES 19 Apr 2002 19:26:33 -0000 1.1810 +++ CHANGES 19 Apr 2002 19:30:31 -0000 1.1811 @@ -614,7 +614,7 @@ *) Autodetect if platforms have isnan() and/or isinf() for use in ap_snprintf.c. [Jim Jagielski] - *) Correct a vulnerability in the Win32 and OS2 ports, by which a + *) Security/DoS: Correct a vulnerability in the Win32 and OS2 ports, by which a client submitting a carefully constructed URI could cause a GP (segment) fault in the child process, which would have to be cleared by the operator to resume operation. This vulnerability