httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From m..@apache.org
Subject svn commit: r613412 - in /httpd/site/trunk: docs/security/vulnerabilities-oval.xml docs/security/vulnerabilities_13.html docs/security/vulnerabilities_20.html docs/security/vulnerabilities_22.html xdocs/security/vulnerabilities-httpd.xml
Date Sat, 19 Jan 2008 16:42:07 GMT
Author: mjc
Date: Sat Jan 19 08:42:06 2008
New Revision: 613412

URL: http://svn.apache.org/viewvc?rev=613412&view=rev
Log:
Vulnerability pages updated for final releases

Modified:
    httpd/site/trunk/docs/security/vulnerabilities-oval.xml
    httpd/site/trunk/docs/security/vulnerabilities_13.html
    httpd/site/trunk/docs/security/vulnerabilities_20.html
    httpd/site/trunk/docs/security/vulnerabilities_22.html
    httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml

Modified: httpd/site/trunk/docs/security/vulnerabilities-oval.xml
URL: http://svn.apache.org/viewvc/httpd/site/trunk/docs/security/vulnerabilities-oval.xml?rev=613412&r1=613411&r2=613412&view=diff
==============================================================================
--- httpd/site/trunk/docs/security/vulnerabilities-oval.xml (original)
+++ httpd/site/trunk/docs/security/vulnerabilities-oval.xml Sat Jan 19 08:42:06 2008
@@ -17,7 +17,7 @@
 <apache_httpd_repository>
 <public>20080102</public>
 <reported>20071215</reported>
-<released/>
+<released>20080119</released>
 <severity level="3">moderate</severity>
 </apache_httpd_repository>
 </metadata>
@@ -94,7 +94,7 @@
 <apache_httpd_repository>
 <public>20071211</public>
 <reported>20071023</reported>
-<released/>
+<released>20080119</released>
 <severity level="3">moderate</severity>
 </apache_httpd_repository>
 </metadata>
@@ -176,7 +176,7 @@
 <apache_httpd_repository>
 <public>20080108</public>
 <reported>20071215</reported>
-<released/>
+<released>20080119</released>
 <severity level="4">low</severity>
 </apache_httpd_repository>
 </metadata>
@@ -228,7 +228,7 @@
 <apache_httpd_repository>
 <public>20080102</public>
 <reported>20071212</reported>
-<released/>
+<released>20080119</released>
 <severity level="4">low</severity>
 </apache_httpd_repository>
 </metadata>
@@ -254,7 +254,7 @@
 <apache_httpd_repository>
 <public>20080102</public>
 <reported>20071212</reported>
-<released/>
+<released>20080119</released>
 <severity level="4">low</severity>
 </apache_httpd_repository>
 </metadata>

Modified: httpd/site/trunk/docs/security/vulnerabilities_13.html
URL: http://svn.apache.org/viewvc/httpd/site/trunk/docs/security/vulnerabilities_13.html?rev=613412&r1=613411&r2=613412&view=diff
==============================================================================
--- httpd/site/trunk/docs/security/vulnerabilities_13.html (original)
+++ httpd/site/trunk/docs/security/vulnerabilities_13.html Sat Jan 19 08:42:06 2008
@@ -86,7 +86,7 @@
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.41-dev"><strong>Fixed in Apache httpd 1.3.41-dev</strong></a>
+   <a name="1.3.41"><strong>Fixed in Apache httpd 1.3.41</strong></a>
   </font>
  </td>
  </tr>
@@ -105,7 +105,9 @@
 scripting attack is possible.
 Note that the server-status page is not enabled by default and it is best practice to not
make this publicly available.</p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     1.3.39, 1.3.37, 1.3.36, 1.3.35, 1.3.34, 1.3.33, 1.3.32, 1.3.31, 1.3.29, 1.3.28, 1.3.27,
1.3.26, 1.3.24, 1.3.22, 1.3.20, 1.3.19, 1.3.17, 1.3.14, 1.3.12, 1.3.11, 1.3.9, 1.3.6, 1.3.4,
1.3.3, 1.3.2<p />
@@ -121,7 +123,9 @@
 mod_imap is enabled and an imagemap file is publicly available, a
 cross-site scripting attack is possible.</p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     1.3.39, 1.3.37, 1.3.36, 1.3.35, 1.3.34, 1.3.33, 1.3.32, 1.3.31, 1.3.29, 1.3.28, 1.3.27,
1.3.26, 1.3.24, 1.3.22, 1.3.20, 1.3.19, 1.3.17, 1.3.14, 1.3.12, 1.3.11, 1.3.9, 1.3.6, 1.3.4,
1.3.3, 1.3.2, 1.3.1, 1.3.0<p />

Modified: httpd/site/trunk/docs/security/vulnerabilities_20.html
URL: http://svn.apache.org/viewvc/httpd/site/trunk/docs/security/vulnerabilities_20.html?rev=613412&r1=613411&r2=613412&view=diff
==============================================================================
--- httpd/site/trunk/docs/security/vulnerabilities_20.html (original)
+++ httpd/site/trunk/docs/security/vulnerabilities_20.html Sat Jan 19 08:42:06 2008
@@ -86,7 +86,7 @@
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.63-dev"><strong>Fixed in Apache httpd 2.0.63-dev</strong></a>
+   <a name="2.0.63"><strong>Fixed in Apache httpd 2.0.63</strong></a>
   </font>
  </td>
  </tr>
@@ -107,7 +107,9 @@
 RFC 2616. 
 </p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     2.0.61, 2.0.59, 2.0.58, 2.0.55, 2.0.54, 2.0.53, 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48,
2.0.47, 2.0.46, 2.0.45, 2.0.44, 2.0.43, 2.0.42, 2.0.40, 2.0.39, 2.0.37, 2.0.36, 2.0.35<p
/>
@@ -124,7 +126,9 @@
 scripting attack is possible.
 Note that the server-status page is not enabled by default and it is best practice to not
make this publicly available.</p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     2.0.61, 2.0.59, 2.0.58, 2.0.55, 2.0.54, 2.0.53, 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48,
2.0.47, 2.0.46, 2.0.45, 2.0.44, 2.0.43, 2.0.42, 2.0.40, 2.0.39, 2.0.37, 2.0.36, 2.0.35<p
/>
@@ -140,7 +144,9 @@
 mod_imap is enabled and an imagemap file is publicly available, a
 cross-site scripting attack is possible.</p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     2.0.61, 2.0.59, 2.0.58, 2.0.55, 2.0.54, 2.0.53, 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48,
2.0.47, 2.0.46, 2.0.45, 2.0.44, 2.0.43, 2.0.42, 2.0.40, 2.0.39, 2.0.37, 2.0.36, 2.0.35<p
/>

Modified: httpd/site/trunk/docs/security/vulnerabilities_22.html
URL: http://svn.apache.org/viewvc/httpd/site/trunk/docs/security/vulnerabilities_22.html?rev=613412&r1=613411&r2=613412&view=diff
==============================================================================
--- httpd/site/trunk/docs/security/vulnerabilities_22.html (original)
+++ httpd/site/trunk/docs/security/vulnerabilities_22.html Sat Jan 19 08:42:06 2008
@@ -86,7 +86,7 @@
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.8-dev"><strong>Fixed in Apache httpd 2.2.8-dev</strong></a>
+   <a name="2.2.8"><strong>Fixed in Apache httpd 2.2.8</strong></a>
   </font>
  </td>
  </tr>
@@ -107,7 +107,9 @@
 RFC 2616. 
 </p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p />
@@ -125,7 +127,9 @@
 request to crash. This could lead to a denial of service if using a
 threaded Multi-Processing Module. </p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p />
@@ -141,7 +145,9 @@
 mod_proxy_balancer is enabled, a cross-site scripting attack against an
 authorized user is possible. </p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p />
@@ -158,7 +164,9 @@
 scripting attack is possible.
 Note that the server-status page is not enabled by default and it is best practice to not
make this publicly available.</p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p />
@@ -174,7 +182,9 @@
 mod_imagemap is enabled and an imagemap file is publicly available, a
 cross-site scripting attack is possible.</p>
 </dd>
-<dd />
+<dd>
+  Update Released: 19th January 2008<br />
+</dd>
 <dd>
       Affects: 
     2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p />

Modified: httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml
URL: http://svn.apache.org/viewvc/httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml?rev=613412&r1=613411&r2=613412&view=diff
==============================================================================
--- httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml (original)
+++ httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml Sat Jan 19 08:42:06 2008
@@ -1,6 +1,6 @@
-<security updated="20080116">
+<security updated="20080119">
 
-<issue fixed="2.2.8-dev" public="20080102" reported="20071215">
+<issue fixed="2.2.8" public="20080102" reported="20071215" released="20080119">
 <cve name="CVE-2007-6388"/>
 <severity level="3">moderate</severity>      
 <title>mod_status XSS</title>
@@ -17,7 +17,7 @@
 <affects prod="httpd" version="2.2.0"/>
 </issue>
 
-<issue fixed="2.0.63-dev" public="20080102" reported="20071215">
+<issue fixed="2.0.63" public="20080102" reported="20071215" released="20080119">
 <cve name="CVE-2007-6388"/>
 <severity level="3">moderate</severity>      
 <title>mod_status XSS</title>
@@ -50,7 +50,7 @@
 <affects prod="httpd" version="2.0.35"/>
 </issue>
 
-<issue fixed="1.3.41-dev" public="20080102" reported="20071215">
+<issue fixed="1.3.41" public="20080102" reported="20071215" released="20080119">
 <cve name="CVE-2007-6388"/>
 <severity level="3">moderate</severity>      
 <title>mod_status XSS</title>
@@ -86,7 +86,7 @@
 <affects prod="httpd" version="1.3.2"/>
 </issue>
 
-<issue fixed="2.2.8-dev" public="20071211" reported="20071023">
+<issue fixed="2.2.8" public="20071211" reported="20071023" released="20080119">
 <cve name="CVE-2007-5000"/>
 <severity level="3">moderate</severity>      
 <title>mod_imagemap XSS</title>
@@ -102,7 +102,7 @@
 <affects prod="httpd" version="2.2.0"/>
 </issue>
 
-<issue fixed="2.0.63-dev" public="20071211" reported="20071023">
+<issue fixed="2.0.63" public="20071211" reported="20071023" released="20080119">
 <cve name="CVE-2007-5000"/>
 <severity level="3">moderate</severity>      
 <title>mod_imap XSS</title>
@@ -134,7 +134,7 @@
 <affects prod="httpd" version="2.0.35"/>
 </issue>
 
-<issue fixed="1.3.41-dev" public="20071211" reported="20071023">
+<issue fixed="1.3.41" public="20071211" reported="20071023" released="20080119">
 <cve name="CVE-2007-5000"/>
 <severity level="3">moderate</severity>      
 <title>mod_imap XSS</title>
@@ -171,7 +171,7 @@
 <affects prod="httpd" version="1.3.0"/>
 </issue>
 
-<issue fixed="2.0.63-dev" public="20080108" reported="20071215">
+<issue fixed="2.0.63" public="20080108" reported="20071215" released="20080119">
 <cve name="CVE-2008-0005"/>
 <severity level="4">low</severity>      
 <title>mod_proxy_ftp UTF-7 XSS</title>
@@ -206,7 +206,7 @@
 <affects prod="httpd" version="2.0.35"/>
 </issue>
 
-<issue fixed="2.2.8-dev" public="20080108" reported="20071215">
+<issue fixed="2.2.8" public="20080108" reported="20071215" released="20080119">
 <cve name="CVE-2008-0005"/>
 <severity level="4">low</severity>      
 <title>mod_proxy_ftp UTF-7 XSS</title>
@@ -225,7 +225,7 @@
 <affects prod="httpd" version="2.2.0"/>
 </issue>
 
-<issue fixed="2.2.8-dev" public="20080102" reported="20071212">
+<issue fixed="2.2.8" public="20080102" reported="20071212" released="20080119">
 <cve name="CVE-2007-6422"/>
 <severity level="4">low</severity>      
 <title>mod_proxy_balancer DoS</title>
@@ -243,7 +243,7 @@
 <affects prod="httpd" version="2.2.0"/>
 </issue>
 
-<issue fixed="2.2.8-dev" public="20080102" reported="20071212">
+<issue fixed="2.2.8" public="20080102" reported="20071212" released="20080119">
 <cve name="CVE-2007-6421"/>
 <severity level="4">low</severity>      
 <title>mod_proxy_balancer XSS</title>



Mime
View raw message