Return-Path: Delivered-To: apmail-httpd-cvs-archive@www.apache.org Received: (qmail 45253 invoked from network); 22 Sep 2004 00:11:20 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur-2.apache.org with SMTP; 22 Sep 2004 00:11:20 -0000 Received: (qmail 4471 invoked by uid 500); 22 Sep 2004 00:11:19 -0000 Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org Received: (qmail 4302 invoked by uid 500); 22 Sep 2004 00:11:17 -0000 Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list cvs@httpd.apache.org Received: (qmail 4272 invoked by uid 500); 22 Sep 2004 00:11:16 -0000 Delivered-To: apmail-httpd-dist-cvs@apache.org Received: (qmail 4263 invoked by uid 99); 22 Sep 2004 00:11:16 -0000 X-ASF-Spam-Status: No, hits=-10.0 required=10.0 tests=ALL_TRUSTED,NO_REAL_NAME X-Spam-Check-By: apache.org Received: from [209.237.227.194] (HELO minotaur.apache.org) (209.237.227.194) by apache.org (qpsmtpd/0.28) with SMTP; Tue, 21 Sep 2004 17:11:15 -0700 Received: (qmail 45224 invoked by uid 1285); 22 Sep 2004 00:11:14 -0000 Date: 22 Sep 2004 00:11:14 -0000 Message-ID: <20040922001114.45223.qmail@minotaur.apache.org> From: bnicholes@apache.org To: httpd-dist-cvs@apache.org Subject: cvs commit: httpd-dist/binaries/netware HEADER.html X-Virus-Checked: Checked X-Spam-Rating: minotaur-2.apache.org 1.6.2 0/1000/N bnicholes 2004/09/21 17:11:14 Modified: binaries/netware HEADER.html Log: Add the comment about the security patch Revision Changes Path 1.2 +11 -0 httpd-dist/binaries/netware/HEADER.html Index: HEADER.html =================================================================== RCS file: /home/cvs/httpd-dist/binaries/netware/HEADER.html,v retrieving revision 1.1 retrieving revision 1.2 diff -u -r1.1 -r1.2 --- HEADER.html 21 Sep 2004 22:51:57 -0000 1.1 +++ HEADER.html 22 Sep 2004 00:11:14 -0000 1.2 @@ -37,3 +37,14 @@ reporting page.  If you require additional information or have questions, please post them on: novell.devsup.webserver.apache2.

+

+NOTICE: The binary build of Apache 2.0.51 available here has been patched for the following security vulnerability:
+ +

+SECURITY: CAN-2004-0811 (cve.mitre.org) + +Fix merging of the Satisfy directive, which was applied to +the surrounding context and could allow access despite configured +authentication. (a regression in 2.0.51) +
+