httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From jwool...@apache.org
Subject cvs commit: httpd-site/xdocs index.xml
Date Fri, 21 Jun 2002 04:00:40 GMT
jwoolley    2002/06/20 21:00:40

  Modified:    docs     index.html
               xdocs    index.xml
  Log:
  tighten
  
  Revision  Changes    Path
  1.32      +7 -7      httpd-site/docs/index.html
  
  Index: index.html
  ===================================================================
  RCS file: /home/cvs/httpd-site/docs/index.html,v
  retrieving revision 1.31
  retrieving revision 1.32
  diff -u -d -u -r1.31 -r1.32
  --- index.html	21 Jun 2002 03:54:00 -0000	1.31
  +++ index.html	21 Jun 2002 04:00:40 -0000	1.32
  @@ -80,8 +80,8 @@
    </td></tr>
    <tr><td>
     <blockquote>
  -<p><b>UPDATE:</b><br />
  -(supersedes security bulletin 20020617)</p>
  +<p><b>UPDATE:</b>
  +<font size="-1">(supersedes security bulletin 20020617)</font></p>
   <p>This follow-up to our earlier advisory is to warn of known-exploitable
   conditions related to this vulnerability on both 64-bit platforms and
   32-bit platforms alike.  Though we previously reported that 32-bit
  @@ -94,11 +94,11 @@
   root access.</p>
   <p>Note that early patches for this issue released by ISS and others do not
   address its full scope.</p>
  -<p>Due to the existence of exploits circulating in the wild for some platforms,
  -the risk is considered high.</p>
  -<p>The Apache Software Foundation has released versions 1.3.26 and 2.0.39
  -that address and fix this issue, and all users are urged to upgrade
  -immediately.</p>
  +<p>Due to the existence of exploits circulating in the wild for some
  +platforms, the risk is considered high.  The Apache Software Foundation
  +has released versions 1.3.26 and 2.0.39 that address and fix this issue,
  +and all users are urged to upgrade immediately.  These versions are
  +available for download; see below.</p>
   <p align="center">
   <a href="info/security_bulletin_20020620.txt">Full Advisory</a>
   </p>
  
  
  
  1.21      +7 -8      httpd-site/xdocs/index.xml
  
  Index: index.xml
  ===================================================================
  RCS file: /home/cvs/httpd-site/xdocs/index.xml,v
  retrieving revision 1.20
  retrieving revision 1.21
  diff -u -d -u -r1.20 -r1.21
  --- index.xml	21 Jun 2002 03:54:00 -0000	1.20
  +++ index.xml	21 Jun 2002 04:00:40 -0000	1.21
  @@ -28,8 +28,8 @@
   <section id="Security">
   <title>SECURITY ADVISORY: June 20, 2002</title>
   
  -<p><b>UPDATE:</b><br/>
  -(supersedes security bulletin 20020617)</p>
  +<p><b>UPDATE:</b>
  +<font size="-1">(supersedes security bulletin 20020617)</font></p>
   
   <p>This follow-up to our earlier advisory is to warn of known-exploitable
   conditions related to this vulnerability on both 64-bit platforms and
  @@ -46,12 +46,11 @@
   <p>Note that early patches for this issue released by ISS and others do not
   address its full scope.</p>
   
  -<p>Due to the existence of exploits circulating in the wild for some platforms,
  -the risk is considered high.</p>
  -
  -<p>The Apache Software Foundation has released versions 1.3.26 and 2.0.39
  -that address and fix this issue, and all users are urged to upgrade
  -immediately.</p>
  +<p>Due to the existence of exploits circulating in the wild for some
  +platforms, the risk is considered high.  The Apache Software Foundation
  +has released versions 1.3.26 and 2.0.39 that address and fix this issue,
  +and all users are urged to upgrade immediately.  These versions are
  +available for download; see below.</p>
   
   <p align="center">
   <a href="info/security_bulletin_20020620.txt">Full Advisory</a>
  
  
  

Mime
View raw message