httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From m..@apache.org
Subject cvs commit: httpd-site/docs/info security_bulletin_20020809a.txt
Date Fri, 09 Aug 2002 19:55:13 GMT
mjc         2002/08/09 12:55:13

  Modified:    xdocs/info security_bulletin_20020809a.txt
               docs/info security_bulletin_20020809a.txt
  Log:
  Get the product name right, keep fiddling with the text
  
  Revision  Changes    Path
  1.4       +12 -10    httpd-site/xdocs/info/security_bulletin_20020809a.txt
  
  Index: security_bulletin_20020809a.txt
  ===================================================================
  RCS file: /home/cvs/httpd-site/xdocs/info/security_bulletin_20020809a.txt,v
  retrieving revision 1.3
  retrieving revision 1.4
  diff -u -r1.3 -r1.4
  --- security_bulletin_20020809a.txt	9 Aug 2002 19:41:36 -0000	1.3
  +++ security_bulletin_20020809a.txt	9 Aug 2002 19:55:13 -0000	1.4
  @@ -1,3 +1,5 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +
   For Immediate Disclosure
   
   =============== SUMMARY ================
  @@ -5,7 +7,7 @@
           Title: Apache 2.0 vulnerability affects non-Unix platforms
            Date: 9th August 2002
        Revision: 2
  - Product Name: Apache httpd server 2.0
  + Product Name: Apache HTTP server 2.0
     OS/Platform: Windows, OS2, Netware
   Permanent URL: http://httpd.apache.org/info/security_bulletin_20020809a.txt
     Vendor Name: Apache Software Foundation
  @@ -36,9 +38,10 @@
   
      RedirectMatch 400 "\\\.\."
   
  -Fixes for this vulnerability are also included in Apache version 2.0.40.
  -Apache 2.0.40 also contains some less serious security fixes.  This
  -release of Apache is available at http://www.apache.org/dist/httpd/
  +Fixes for this vulnerability are also included in Apache HTTP server
  +version 2.0.40.  The 2.0.40 release also contains fixes for two minor
  +path-revealing exposures.  This release of Apache is available at
  +http://www.apache.org/dist/httpd/
   
   More information will be made available by the Apache Software
   Foundation and Auriemma Luigi <bugtest@sitoverde.com> in the
  @@ -50,16 +53,15 @@
   assigned the name CAN-2002-0661 to this issue.
   
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0661
  -
   -----BEGIN PGP SIGNATURE-----
   Version: GnuPG v1.0.6 (GNU/Linux)
   Comment: For info see http://www.gnupg.org
   
  -iQCVAwUBPVQoqu6tTP1JpWPZAQE3bwP+K4bHZofcuzfClRLTay/Ro4sEct3NBr/z
  -e19ugCQp1gJBpwsyzUKy5kN4e2a2DqsLgjzQCerLD1wYeJrWnnEgI8Y+/8GkAM0m
  -MinDdKONKcRewkSLDThLG5KyVK7BxQwB9N5HY7NQo7TLe0xUx1mg70fby/zl6Q0a
  -4YnUkGSxWsA=
  -=UwLm
  +iQCVAwUBPVQro+6tTP1JpWPZAQEyNgP/Z/b97smPeXO5cpHtvj4cJc4PFWCZwrmI
  +3A+Pevcj12KUAbBqUhtt72bV12xrnJ1dVe6q2EEmGq5HAlC76IZTww+XPgYPjwD6
  +Du9CPZ9PYFo3IguPYEVSpB6dIOhgsJQ3OswsJ8KLqdyl2EpqG4BXX3/L4DklMaza
  +XmziDuXjoZc=
  +=4WPC
   -----END PGP SIGNATURE-----
   
   
  
  
  
  1.4       +12 -10    httpd-site/docs/info/security_bulletin_20020809a.txt
  
  Index: security_bulletin_20020809a.txt
  ===================================================================
  RCS file: /home/cvs/httpd-site/docs/info/security_bulletin_20020809a.txt,v
  retrieving revision 1.3
  retrieving revision 1.4
  diff -u -r1.3 -r1.4
  --- security_bulletin_20020809a.txt	9 Aug 2002 19:41:36 -0000	1.3
  +++ security_bulletin_20020809a.txt	9 Aug 2002 19:55:13 -0000	1.4
  @@ -1,3 +1,5 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +
   For Immediate Disclosure
   
   =============== SUMMARY ================
  @@ -5,7 +7,7 @@
           Title: Apache 2.0 vulnerability affects non-Unix platforms
            Date: 9th August 2002
        Revision: 2
  - Product Name: Apache httpd server 2.0
  + Product Name: Apache HTTP server 2.0
     OS/Platform: Windows, OS2, Netware
   Permanent URL: http://httpd.apache.org/info/security_bulletin_20020809a.txt
     Vendor Name: Apache Software Foundation
  @@ -36,9 +38,10 @@
   
      RedirectMatch 400 "\\\.\."
   
  -Fixes for this vulnerability are also included in Apache version 2.0.40.
  -Apache 2.0.40 also contains some less serious security fixes.  This
  -release of Apache is available at http://www.apache.org/dist/httpd/
  +Fixes for this vulnerability are also included in Apache HTTP server
  +version 2.0.40.  The 2.0.40 release also contains fixes for two minor
  +path-revealing exposures.  This release of Apache is available at
  +http://www.apache.org/dist/httpd/
   
   More information will be made available by the Apache Software
   Foundation and Auriemma Luigi <bugtest@sitoverde.com> in the
  @@ -50,16 +53,15 @@
   assigned the name CAN-2002-0661 to this issue.
   
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0661
  -
   -----BEGIN PGP SIGNATURE-----
   Version: GnuPG v1.0.6 (GNU/Linux)
   Comment: For info see http://www.gnupg.org
   
  -iQCVAwUBPVQoqu6tTP1JpWPZAQE3bwP+K4bHZofcuzfClRLTay/Ro4sEct3NBr/z
  -e19ugCQp1gJBpwsyzUKy5kN4e2a2DqsLgjzQCerLD1wYeJrWnnEgI8Y+/8GkAM0m
  -MinDdKONKcRewkSLDThLG5KyVK7BxQwB9N5HY7NQo7TLe0xUx1mg70fby/zl6Q0a
  -4YnUkGSxWsA=
  -=UwLm
  +iQCVAwUBPVQro+6tTP1JpWPZAQEyNgP/Z/b97smPeXO5cpHtvj4cJc4PFWCZwrmI
  +3A+Pevcj12KUAbBqUhtt72bV12xrnJ1dVe6q2EEmGq5HAlC76IZTww+XPgYPjwD6
  +Du9CPZ9PYFo3IguPYEVSpB6dIOhgsJQ3OswsJ8KLqdyl2EpqG4BXX3/L4DklMaza
  +XmziDuXjoZc=
  +=4WPC
   -----END PGP SIGNATURE-----
   
   
  
  
  

Mime
View raw message