httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From m..@apache.org
Subject svn commit: r1180002 - in /httpd/site/trunk: docs/security/vulnerabilities_13.html docs/security/vulnerabilities_20.html docs/security/vulnerabilities_22.html xdocs/stylesheets/securitydb.xsl
Date Fri, 07 Oct 2011 11:05:43 GMT
Author: mjc
Date: Fri Oct  7 11:05:42 2011
New Revision: 1180002

URL: http://svn.apache.org/viewvc?rev=1180002&view=rev
Log:
Stylesheet hack to better handle 'wont fix'

Modified:
    httpd/site/trunk/docs/security/vulnerabilities_13.html
    httpd/site/trunk/docs/security/vulnerabilities_20.html
    httpd/site/trunk/docs/security/vulnerabilities_22.html
    httpd/site/trunk/xdocs/stylesheets/securitydb.xsl

Modified: httpd/site/trunk/docs/security/vulnerabilities_13.html
URL: http://svn.apache.org/viewvc/httpd/site/trunk/docs/security/vulnerabilities_13.html?rev=1180002&r1=1180001&r2=1180002&view=diff
==============================================================================
--- httpd/site/trunk/docs/security/vulnerabilities_13.html [utf-8] (original)
+++ httpd/site/trunk/docs/security/vulnerabilities_13.html [utf-8] Fri Oct  7 11:05:42 2011
@@ -93,7 +93,8 @@ Team</a>.  </p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3-never"><strong>Fixed in Apache httpd 1.3-never</strong></a>
+   <a name="1.3-never"><strong>
+Not fixed in Apache httpd 1.3</strong></a>
   </font>
  </td>
  </tr>
@@ -138,7 +139,8 @@ This issue was reported by Context Infor
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.42"><strong>Fixed in Apache httpd 1.3.42</strong></a>
+   <a name="1.3.42"><strong>
+Fixed in Apache httpd 1.3.42</strong></a>
   </font>
  </td>
  </tr>
@@ -176,7 +178,8 @@ via a carefully crafted response.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.41"><strong>Fixed in Apache httpd 1.3.41</strong></a>
+   <a name="1.3.41"><strong>
+Fixed in Apache httpd 1.3.41</strong></a>
   </font>
  </td>
  </tr>
@@ -232,7 +235,8 @@ cross-site scripting attack is possible.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.39"><strong>Fixed in Apache httpd 1.3.39</strong></a>
+   <a name="1.3.39"><strong>
+Fixed in Apache httpd 1.3.39</strong></a>
   </font>
  </td>
  </tr>
@@ -291,7 +295,8 @@ terminated which could lead to a denial 
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.37"><strong>Fixed in Apache httpd 1.3.37</strong></a>
+   <a name="1.3.37"><strong>
+Fixed in Apache httpd 1.3.37</strong></a>
   </font>
  </td>
  </tr>
@@ -331,7 +336,8 @@ processes) or potentially allow arbitrar
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.35"><strong>Fixed in Apache httpd 1.3.35</strong></a>
+   <a name="1.3.35"><strong>
+Fixed in Apache httpd 1.3.35</strong></a>
   </font>
  </td>
  </tr>
@@ -392,7 +398,8 @@ URL using certain web browsers.  
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.33"><strong>Fixed in Apache httpd 1.3.33</strong></a>
+   <a name="1.3.33"><strong>
+Fixed in Apache httpd 1.3.33</strong></a>
   </font>
  </td>
  </tr>
@@ -427,7 +434,8 @@ the privileges of a httpd child.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.32"><strong>Fixed in Apache httpd 1.3.32</strong></a>
+   <a name="1.3.32"><strong>
+Fixed in Apache httpd 1.3.32</strong></a>
   </font>
  </td>
  </tr>
@@ -468,7 +476,8 @@ lead to remote arbitrary code execution 
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.31"><strong>Fixed in Apache httpd 1.3.31</strong></a>
+   <a name="1.3.31"><strong>
+Fixed in Apache httpd 1.3.31</strong></a>
   </font>
  </td>
  </tr>
@@ -575,7 +584,8 @@ mod_auth_digest.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.29"><strong>Fixed in Apache httpd 1.3.29</strong></a>
+   <a name="1.3.29"><strong>
+Fixed in Apache httpd 1.3.29</strong></a>
   </font>
  </td>
  </tr>
@@ -612,7 +622,8 @@ file (.htaccess or httpd.conf)
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.28"><strong>Fixed in Apache httpd 1.3.28</strong></a>
+   <a name="1.3.28"><strong>
+Fixed in Apache httpd 1.3.28</strong></a>
   </font>
  </td>
  </tr>
@@ -646,7 +657,8 @@ and exit if it received special control 
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.27"><strong>Fixed in Apache httpd 1.3.27</strong></a>
+   <a name="1.3.27"><strong>
+Fixed in Apache httpd 1.3.27</strong></a>
   </font>
  </td>
  </tr>
@@ -722,7 +734,8 @@ via the Host: header.</p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.26"><strong>Fixed in Apache httpd 1.3.26</strong></a>
+   <a name="1.3.26"><strong>
+Fixed in Apache httpd 1.3.26</strong></a>
   </font>
  </td>
  </tr>
@@ -778,7 +791,8 @@ to escape sequences,
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.24"><strong>Fixed in Apache httpd 1.3.24</strong></a>
+   <a name="1.3.24"><strong>
+Fixed in Apache httpd 1.3.24</strong></a>
   </font>
  </td>
  </tr>
@@ -810,7 +824,8 @@ to batch file CGI scripts.</p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.22"><strong>Fixed in Apache httpd 1.3.22</strong></a>
+   <a name="1.3.22"><strong>
+Fixed in Apache httpd 1.3.22</strong></a>
   </font>
  </td>
  </tr>
@@ -884,7 +899,8 @@ the default index page. </p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.20"><strong>Fixed in Apache httpd 1.3.20</strong></a>
+   <a name="1.3.20"><strong>
+Fixed in Apache httpd 1.3.20</strong></a>
   </font>
  </td>
  </tr>
@@ -919,7 +935,8 @@ the default index page. </p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.19"><strong>Fixed in Apache httpd 1.3.19</strong></a>
+   <a name="1.3.19"><strong>
+Fixed in Apache httpd 1.3.19</strong></a>
   </font>
  </td>
  </tr>
@@ -952,7 +969,8 @@ the default index page. </p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.14"><strong>Fixed in Apache httpd 1.3.14</strong></a>
+   <a name="1.3.14"><strong>
+Fixed in Apache httpd 1.3.14</strong></a>
   </font>
  </td>
  </tr>
@@ -1025,7 +1043,8 @@ the default index page. </p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.12"><strong>Fixed in Apache httpd 1.3.12</strong></a>
+   <a name="1.3.12"><strong>
+Fixed in Apache httpd 1.3.12</strong></a>
   </font>
  </td>
  </tr>
@@ -1062,7 +1081,8 @@ the default index page. </p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.11"><strong>Fixed in Apache httpd 1.3.11</strong></a>
+   <a name="1.3.11"><strong>
+Fixed in Apache httpd 1.3.11</strong></a>
   </font>
  </td>
  </tr>
@@ -1099,7 +1119,8 @@ the new <samp>mod_vhost_alias</samp> mod
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.4"><strong>Fixed in Apache httpd 1.3.4</strong></a>
+   <a name="1.3.4"><strong>
+Fixed in Apache httpd 1.3.4</strong></a>
   </font>
  </td>
  </tr>
@@ -1131,7 +1152,8 @@ against people trying to access special 
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="1.3.2"><strong>Fixed in Apache httpd 1.3.2</strong></a>
+   <a name="1.3.2"><strong>
+Fixed in Apache httpd 1.3.2</strong></a>
   </font>
  </td>
  </tr>

Modified: httpd/site/trunk/docs/security/vulnerabilities_20.html
URL: http://svn.apache.org/viewvc/httpd/site/trunk/docs/security/vulnerabilities_20.html?rev=1180002&r1=1180001&r2=1180002&view=diff
==============================================================================
--- httpd/site/trunk/docs/security/vulnerabilities_20.html [utf-8] (original)
+++ httpd/site/trunk/docs/security/vulnerabilities_20.html [utf-8] Fri Oct  7 11:05:42 2011
@@ -93,7 +93,8 @@ Team</a>.  </p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.65-dev"><strong>Fixed in Apache httpd 2.0.65-dev</strong></a>
+   <a name="2.0.65-dev"><strong>
+Fixed in Apache httpd 2.0.65-dev</strong></a>
   </font>
  </td>
  </tr>
@@ -196,7 +197,8 @@ This issue was reported by Maksymilian A
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.64"><strong>Fixed in Apache httpd 2.0.64</strong></a>
+   <a name="2.0.64"><strong>
+Fixed in Apache httpd 2.0.64</strong></a>
   </font>
  </td>
  </tr>
@@ -503,7 +505,8 @@ could cause a denial of service or high 
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.63"><strong>Fixed in Apache httpd 2.0.63</strong></a>
+   <a name="2.0.63"><strong>
+Fixed in Apache httpd 2.0.63</strong></a>
   </font>
  </td>
  </tr>
@@ -582,7 +585,8 @@ cross-site scripting attack is possible.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.61"><strong>Fixed in Apache httpd 2.0.61</strong></a>
+   <a name="2.0.61"><strong>
+Fixed in Apache httpd 2.0.61</strong></a>
   </font>
  </td>
  </tr>
@@ -685,7 +689,8 @@ Multi-Processing Module.</p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.59"><strong>Fixed in Apache httpd 2.0.59</strong></a>
+   <a name="2.0.59"><strong>
+Fixed in Apache httpd 2.0.59</strong></a>
   </font>
  </td>
  </tr>
@@ -725,7 +730,8 @@ processes) or potentially allow arbitrar
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.58"><strong>Fixed in Apache httpd 2.0.58</strong></a>
+   <a name="2.0.58"><strong>
+Fixed in Apache httpd 2.0.58</strong></a>
   </font>
  </td>
  </tr>
@@ -785,7 +791,8 @@ URL using certain web browsers.  
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.55"><strong>Fixed in Apache httpd 2.0.55</strong></a>
+   <a name="2.0.55"><strong>
+Fixed in Apache httpd 2.0.55</strong></a>
   </font>
  </td>
  </tr>
@@ -934,7 +941,8 @@ lead to cross-site scripting (XSS) attac
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.53"><strong>Fixed in Apache httpd 2.0.53</strong></a>
+   <a name="2.0.53"><strong>
+Fixed in Apache httpd 2.0.53</strong></a>
   </font>
  </td>
  </tr>
@@ -1015,7 +1023,8 @@ any cipher suite allowed by the virtual 
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.52"><strong>Fixed in Apache httpd 2.0.52</strong></a>
+   <a name="2.0.52"><strong>
+Fixed in Apache httpd 2.0.52</strong></a>
   </font>
  </td>
  </tr>
@@ -1050,7 +1059,8 @@ resources despite any configured authent
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.51"><strong>Fixed in Apache httpd 2.0.51</strong></a>
+   <a name="2.0.51"><strong>
+Fixed in Apache httpd 2.0.51</strong></a>
   </font>
  </td>
  </tr>
@@ -1187,7 +1197,8 @@ threaded process model is in use.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.50"><strong>Fixed in Apache httpd 2.0.50</strong></a>
+   <a name="2.0.50"><strong>
+Fixed in Apache httpd 2.0.50</strong></a>
   </font>
  </td>
  </tr>
@@ -1243,7 +1254,8 @@ field which exceeds 6K in length.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.49"><strong>Fixed in Apache httpd 2.0.49</strong></a>
+   <a name="2.0.49"><strong>
+Fixed in Apache httpd 2.0.49</strong></a>
   </font>
  </td>
  </tr>
@@ -1324,7 +1336,8 @@ sequences.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.48"><strong>Fixed in Apache httpd 2.0.48</strong></a>
+   <a name="2.0.48"><strong>
+Fixed in Apache httpd 2.0.48</strong></a>
   </font>
  </td>
  </tr>
@@ -1382,7 +1395,8 @@ is used.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.47"><strong>Fixed in Apache httpd 2.0.47</strong></a>
+   <a name="2.0.47"><strong>
+Fixed in Apache httpd 2.0.47</strong></a>
   </font>
  </td>
  </tr>
@@ -1462,7 +1476,8 @@ an infinite loop occurs causing a remote
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.46"><strong>Fixed in Apache httpd 2.0.46</strong></a>
+   <a name="2.0.46"><strong>
+Fixed in Apache httpd 2.0.46</strong></a>
   </font>
  </td>
  </tr>
@@ -1562,7 +1577,8 @@ to escape sequences.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.45"><strong>Fixed in Apache httpd 2.0.45</strong></a>
+   <a name="2.0.45"><strong>
+Fixed in Apache httpd 2.0.45</strong></a>
   </font>
  </td>
  </tr>
@@ -1598,7 +1614,8 @@ causes Apache to allocate 80 bytes for e
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.44"><strong>Fixed in Apache httpd 2.0.44</strong></a>
+   <a name="2.0.44"><strong>
+Fixed in Apache httpd 2.0.44</strong></a>
   </font>
  </td>
  </tr>
@@ -1653,7 +1670,8 @@ by appending illegal characters such as 
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.43"><strong>Fixed in Apache httpd 2.0.43</strong></a>
+   <a name="2.0.43"><strong>
+Fixed in Apache httpd 2.0.43</strong></a>
   </font>
  </td>
  </tr>
@@ -1706,7 +1724,8 @@ a remote user. </p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.42"><strong>Fixed in Apache httpd 2.0.42</strong></a>
+   <a name="2.0.42"><strong>
+Fixed in Apache httpd 2.0.42</strong></a>
   </font>
  </td>
  </tr>
@@ -1742,7 +1761,8 @@ in a denial of service where a threaded 
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.40"><strong>Fixed in Apache httpd 2.0.40</strong></a>
+   <a name="2.0.40"><strong>
+Fixed in Apache httpd 2.0.40</strong></a>
   </font>
  </td>
  </tr>
@@ -1801,7 +1821,8 @@ of the script.</p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.37"><strong>Fixed in Apache httpd 2.0.37</strong></a>
+   <a name="2.0.37"><strong>
+Fixed in Apache httpd 2.0.37</strong></a>
   </font>
  </td>
  </tr>
@@ -1836,7 +1857,8 @@ cases the ability to execute arbitrary r
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.0.36"><strong>Fixed in Apache httpd 2.0.36</strong></a>
+   <a name="2.0.36"><strong>
+Fixed in Apache httpd 2.0.36</strong></a>
   </font>
  </td>
  </tr>

Modified: httpd/site/trunk/docs/security/vulnerabilities_22.html
URL: http://svn.apache.org/viewvc/httpd/site/trunk/docs/security/vulnerabilities_22.html?rev=1180002&r1=1180001&r2=1180002&view=diff
==============================================================================
--- httpd/site/trunk/docs/security/vulnerabilities_22.html [utf-8] (original)
+++ httpd/site/trunk/docs/security/vulnerabilities_22.html [utf-8] Fri Oct  7 11:05:42 2011
@@ -93,7 +93,8 @@ Team</a>.  </p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.22-dev"><strong>Fixed in Apache httpd 2.2.22-dev</strong></a>
+   <a name="2.2.22-dev"><strong>
+Fixed in Apache httpd 2.2.22-dev</strong></a>
   </font>
  </td>
  </tr>
@@ -135,7 +136,8 @@ This issue was reported by Context Infor
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.21"><strong>Fixed in Apache httpd 2.2.21</strong></a>
+   <a name="2.2.21"><strong>
+Fixed in Apache httpd 2.2.21</strong></a>
   </font>
  </td>
  </tr>
@@ -172,7 +174,8 @@ This could lead to a temporary denial of
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.20"><strong>Fixed in Apache httpd 2.2.20</strong></a>
+   <a name="2.2.20"><strong>
+Fixed in Apache httpd 2.2.20</strong></a>
   </font>
  </td>
  </tr>
@@ -211,7 +214,8 @@ Advisory: <a href="CVE-2011-3192.txt">CV
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.19"><strong>Fixed in Apache httpd 2.2.19</strong></a>
+   <a name="2.2.19"><strong>
+Fixed in Apache httpd 2.2.19</strong></a>
   </font>
  </td>
  </tr>
@@ -263,7 +267,8 @@ This issue was reported by Maksymilian A
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.17"><strong>Fixed in Apache httpd 2.2.17</strong></a>
+   <a name="2.2.17"><strong>
+Fixed in Apache httpd 2.2.17</strong></a>
   </font>
  </td>
  </tr>
@@ -346,7 +351,8 @@ service.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.16"><strong>Fixed in Apache httpd 2.2.16</strong></a>
+   <a name="2.2.16"><strong>
+Fixed in Apache httpd 2.2.16</strong></a>
   </font>
  </td>
  </tr>
@@ -437,7 +443,8 @@ This issue was reported by Mark Drayton.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.15"><strong>Fixed in Apache httpd 2.2.15</strong></a>
+   <a name="2.2.15"><strong>
+Fixed in Apache httpd 2.2.15</strong></a>
   </font>
  </td>
  </tr>
@@ -543,7 +550,8 @@ proposing a patch fix for this issue.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.14"><strong>Fixed in Apache httpd 2.2.14</strong></a>
+   <a name="2.2.14"><strong>
+Fixed in Apache httpd 2.2.14</strong></a>
   </font>
  </td>
  </tr>
@@ -625,7 +633,8 @@ event MPMs, resulting in a denial of ser
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.13"><strong>Fixed in Apache httpd 2.2.13</strong></a>
+   <a name="2.2.13"><strong>
+Fixed in Apache httpd 2.2.13</strong></a>
   </font>
  </td>
  </tr>
@@ -664,7 +673,8 @@ in a vulnerable way.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.12"><strong>Fixed in Apache httpd 2.2.12</strong></a>
+   <a name="2.2.12"><strong>
+Fixed in Apache httpd 2.2.12</strong></a>
   </font>
  </td>
  </tr>
@@ -833,7 +843,8 @@ processed by the pattern preparation eng
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.10"><strong>Fixed in Apache httpd 2.2.10</strong></a>
+   <a name="2.2.10"><strong>
+Fixed in Apache httpd 2.2.10</strong></a>
   </font>
  </td>
  </tr>
@@ -893,7 +904,8 @@ to cross-site scripting (XSS) attacks.</
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.9"><strong>Fixed in Apache httpd 2.2.9</strong></a>
+   <a name="2.2.9"><strong>
+Fixed in Apache httpd 2.2.9</strong></a>
   </font>
  </td>
  </tr>
@@ -948,7 +960,8 @@ could cause a denial of service or high 
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.8"><strong>Fixed in Apache httpd 2.2.8</strong></a>
+   <a name="2.2.8"><strong>
+Fixed in Apache httpd 2.2.8</strong></a>
   </font>
  </td>
  </tr>
@@ -1069,7 +1082,8 @@ cross-site scripting attack is possible.
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.6"><strong>Fixed in Apache httpd 2.2.6</strong></a>
+   <a name="2.2.6"><strong>
+Fixed in Apache httpd 2.2.6</strong></a>
   </font>
  </td>
  </tr>
@@ -1193,7 +1207,8 @@ Multi-Processing Module.</p>
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.3"><strong>Fixed in Apache httpd 2.2.3</strong></a>
+   <a name="2.2.3"><strong>
+Fixed in Apache httpd 2.2.3</strong></a>
   </font>
  </td>
  </tr>
@@ -1233,7 +1248,8 @@ processes) or potentially allow arbitrar
  <tr>
  <td bgcolor="#525D76">
   <font color="#ffffff" face="arial,helvetica,sanserif">
-   <a name="2.2.2"><strong>Fixed in Apache httpd 2.2.2</strong></a>
+   <a name="2.2.2"><strong>
+Fixed in Apache httpd 2.2.2</strong></a>
   </font>
  </td>
  </tr>

Modified: httpd/site/trunk/xdocs/stylesheets/securitydb.xsl
URL: http://svn.apache.org/viewvc/httpd/site/trunk/xdocs/stylesheets/securitydb.xsl?rev=1180002&r1=1180001&r2=1180002&view=diff
==============================================================================
--- httpd/site/trunk/xdocs/stylesheets/securitydb.xsl (original)
+++ httpd/site/trunk/xdocs/stylesheets/securitydb.xsl Fri Oct  7 11:05:42 2011
@@ -41,7 +41,16 @@ Team</a>.  </p>
 <xsl:for-each select="issue/@fixed[generate-id()=generate-id(key('unique-version',.))]">
 <xsl:variable name="ver" select="."/>
 <xsl:if test="substring($ver,1,3)=$majorversion">
-  <section id="{$ver}"><title>Fixed in Apache httpd <xsl:value-of select="$ver"/></title>
+  <section id="{$ver}"><title>
+    <xsl:choose>
+    <xsl:when test="substring($ver,4)='-never'">
+Not fixed in Apache httpd <xsl:value-of select="$majorversion"/>
+    </xsl:when>
+    <xsl:otherwise>
+Fixed in Apache httpd <xsl:value-of select="$ver"/>
+    </xsl:otherwise>
+    </xsl:choose>
+    </title>
              <dl>
                 <xsl:apply-templates select="../../issue[@fixed=$ver]">
 		  <xsl:sort select="./severity[@level]" order="ascending"/>



Mime
View raw message