Return-Path:
Delivered-To: apmail-httpd-cvs-archive@www.apache.org
Received: (qmail 45253 invoked from network); 22 Sep 2004 00:11:20 -0000
Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199)
by minotaur-2.apache.org with SMTP; 22 Sep 2004 00:11:20 -0000
Received: (qmail 4471 invoked by uid 500); 22 Sep 2004 00:11:19 -0000
Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org
Received: (qmail 4302 invoked by uid 500); 22 Sep 2004 00:11:17 -0000
Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm
Precedence: bulk
Reply-To: dev@httpd.apache.org
list-help:
list-unsubscribe:
list-post:
Delivered-To: mailing list cvs@httpd.apache.org
Received: (qmail 4272 invoked by uid 500); 22 Sep 2004 00:11:16 -0000
Delivered-To: apmail-httpd-dist-cvs@apache.org
Received: (qmail 4263 invoked by uid 99); 22 Sep 2004 00:11:16 -0000
X-ASF-Spam-Status: No, hits=-10.0 required=10.0
tests=ALL_TRUSTED,NO_REAL_NAME
X-Spam-Check-By: apache.org
Received: from [209.237.227.194] (HELO minotaur.apache.org) (209.237.227.194)
by apache.org (qpsmtpd/0.28) with SMTP; Tue, 21 Sep 2004 17:11:15 -0700
Received: (qmail 45224 invoked by uid 1285); 22 Sep 2004 00:11:14 -0000
Date: 22 Sep 2004 00:11:14 -0000
Message-ID: <20040922001114.45223.qmail@minotaur.apache.org>
From: bnicholes@apache.org
To: httpd-dist-cvs@apache.org
Subject: cvs commit: httpd-dist/binaries/netware HEADER.html
X-Virus-Checked: Checked
X-Spam-Rating: minotaur-2.apache.org 1.6.2 0/1000/N
bnicholes 2004/09/21 17:11:14
Modified: binaries/netware HEADER.html
Log:
Add the comment about the security patch
Revision Changes Path
1.2 +11 -0 httpd-dist/binaries/netware/HEADER.html
Index: HEADER.html
===================================================================
RCS file: /home/cvs/httpd-dist/binaries/netware/HEADER.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- HEADER.html 21 Sep 2004 22:51:57 -0000 1.1
+++ HEADER.html 22 Sep 2004 00:11:14 -0000 1.2
@@ -37,3 +37,14 @@
reporting page. If you require additional information or have questions, please post them on: novell.devsup.webserver.apache2.
+
+NOTICE: The binary build of Apache 2.0.51 available here has been patched for the following security vulnerability:
+
+
+SECURITY: CAN-2004-0811 (cve.mitre.org)
+
+Fix merging of the Satisfy directive, which was applied to
+the surrounding context and could allow access despite configured
+authentication. (a regression in 2.0.51)
+
+