Return-Path:
Delivered-To: apmail-httpd-cvs-archive@www.apache.org
Received: (qmail 72882 invoked from network); 30 Jun 2004 18:27:10 -0000
Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199)
by minotaur-2.apache.org with SMTP; 30 Jun 2004 18:27:10 -0000
Received: (qmail 14995 invoked by uid 500); 30 Jun 2004 18:27:18 -0000
Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org
Received: (qmail 14925 invoked by uid 500); 30 Jun 2004 18:27:17 -0000
Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm
Precedence: bulk
Reply-To: dev@httpd.apache.org
list-help:
list-unsubscribe:
list-post:
Delivered-To: mailing list cvs@httpd.apache.org
Received: (qmail 14854 invoked by uid 500); 30 Jun 2004 18:27:17 -0000
Delivered-To: apmail-httpd-dist-cvs@apache.org
Received: (qmail 14662 invoked by uid 99); 30 Jun 2004 18:27:15 -0000
X-ASF-Spam-Status: No, hits=0.5 required=10.0
tests=ALL_TRUSTED,NO_REAL_NAME
X-Spam-Check-By: apache.org
Received: from [209.237.227.194] (HELO minotaur.apache.org) (209.237.227.194)
by apache.org (qpsmtpd/0.27.1) with SMTP; Wed, 30 Jun 2004 11:27:14 -0700
Received: (qmail 72217 invoked by uid 1548); 30 Jun 2004 18:26:58 -0000
Date: 30 Jun 2004 18:26:58 -0000
Message-ID: <20040630182658.72216.qmail@minotaur.apache.org>
From: kess@apache.org
To: httpd-dist-cvs@apache.org
Subject: cvs commit: httpd-dist Announcement2.html.de Announcement2.txt.de
X-Virus-Checked: Checked
X-Spam-Rating: minotaur-2.apache.org 1.6.2 0/1000/N
kess 2004/06/30 11:26:58
Modified: . Announcement2.html.de Announcement2.txt.de
Log:
adjust German translation
Revision Changes Path
1.6 +3 -2 httpd-dist/Announcement2.html.de
Index: Announcement2.html.de
===================================================================
RCS file: /home/cvs/httpd-dist/Announcement2.html.de,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- Announcement2.html.de 30 Jun 2004 18:10:06 -0000 1.5
+++ Announcement2.html.de 30 Jun 2004 18:26:58 -0000 1.6
@@ -41,8 +41,9 @@
href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493"
>CAN-2004-0493]
-Ein SSL-Client-Zertifikat mit einem DN-Subject von mehr als 6K Länge
- kann im FakeBasicAuth-Code einen Pufferüberlauf erzeugen.
+
Beseitigung eines Pufferüberlaufs in mod_ssl im FakeBasicAuth-Code bei
+ (vertrauenswürdigen) Client-Zeritfikaten mit einem DN-Subject von
+ mehr als 6K Länge.
[CAN-2004-0488]
1.9 +3 -2 httpd-dist/Announcement2.txt.de
Index: Announcement2.txt.de
===================================================================
RCS file: /home/cvs/httpd-dist/Announcement2.txt.de,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -r1.8 -r1.9
--- Announcement2.txt.de 30 Jun 2004 18:10:06 -0000 1.8
+++ Announcement2.txt.de 30 Jun 2004 18:26:58 -0000 1.9
@@ -16,8 +16,9 @@
�berm��igen Speicherverbrauch einen Denial-of-Service-Angriff erm�glichen.
[http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493]
- Ein SSL-Client-Zertifikat mit einem DN-Subject von mehr als 6K L�nge kann
- im FakeBasicAuth-Code einen Puffer�berlauf erzeugen.
+ Beseitigung eines Puffer�berlaufs in mod_ssl im FakeBasicAuth-Code bei
+ (vertrauensw�rdigen) Client-Zeritfikaten mit einem DN-Subject von
+ mehr als 6K L�nge.
[http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488]
Dieses Release ist zu Modulen kompatibel, die f�r Apache 2.0.42 und