Return-Path:
X-Original-To: apmail-httpd-cvs-archive@www.apache.org
Delivered-To: apmail-httpd-cvs-archive@www.apache.org
Received: from mail.apache.org (hermes.apache.org [140.211.11.3])
by minotaur.apache.org (Postfix) with SMTP id 1ED1B4E41
for ;
Wed, 11 May 2011 11:48:17 +0000 (UTC)
Received: (qmail 45234 invoked by uid 500); 11 May 2011 11:48:16 -0000
Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org
Received: (qmail 45124 invoked by uid 500); 11 May 2011 11:48:16 -0000
Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm
Precedence: bulk
Reply-To: dev@httpd.apache.org
list-help:
list-unsubscribe:
List-Post:
List-Id:
Delivered-To: mailing list cvs@httpd.apache.org
Received: (qmail 45117 invoked by uid 99); 11 May 2011 11:48:16 -0000
Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136)
by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 11 May 2011 11:48:16 +0000
X-ASF-Spam-Status: No, hits=-2000.0 required=5.0
tests=ALL_TRUSTED
X-Spam-Check-By: apache.org
Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4)
by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 11 May 2011 11:48:15 +0000
Received: by eris.apache.org (Postfix, from userid 65534)
id D4D8F2388A36; Wed, 11 May 2011 11:47:55 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Subject: svn commit: r1101842 - in /httpd/site/trunk:
docs/security/vulnerabilities_22.html
xdocs/security/vulnerabilities-httpd.xml
Date: Wed, 11 May 2011 11:47:55 -0000
To: cvs@httpd.apache.org
From: mjc@apache.org
X-Mailer: svnmailer-1.0.8
Message-Id: <20110511114755.D4D8F2388A36@eris.apache.org>
Author: mjc
Date: Wed May 11 11:47:55 2011
New Revision: 1101842
URL: http://svn.apache.org/viewvc?rev=1101842&view=rev
Log:
mjc: possibly s/Mitigation/Workaround/, as that seems to be what was used before
Modified:
httpd/site/trunk/docs/security/vulnerabilities_22.html
httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml
Modified: httpd/site/trunk/docs/security/vulnerabilities_22.html
URL: http://svn.apache.org/viewvc/httpd/site/trunk/docs/security/vulnerabilities_22.html?rev=1101842&r1=1101841&r2=1101842&view=diff
==============================================================================
--- httpd/site/trunk/docs/security/vulnerabilities_22.html [utf-8] (original)
+++ httpd/site/trunk/docs/security/vulnerabilities_22.html [utf-8] Wed May 11 11:47:55 2011
@@ -115,7 +115,7 @@ cause excessive CPU usage. This could b
attack.
-Mitigation: Setting the 'IgnoreClient' option to the 'IndexOptions'
+Workaround: Setting the 'IgnoreClient' option to the 'IndexOptions'
directive disables processing of the client-supplied request query
arguments, preventing this attack.
Modified: httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml
URL: http://svn.apache.org/viewvc/httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml?rev=1101842&r1=1101841&r2=1101842&view=diff
==============================================================================
--- httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml [utf-8] (original)
+++ httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml [utf-8] Wed May 11 11:47:55 2011
@@ -12,7 +12,7 @@ remote attacker could send a carefully c
cause excessive CPU usage. This could be used in a denial of service
attack.
-Mitigation: Setting the 'IgnoreClient' option to the 'IndexOptions'
+Workaround: Setting the 'IgnoreClient' option to the 'IndexOptions'
directive disables processing of the client-supplied request query
arguments, preventing this attack.