Return-Path: X-Original-To: apmail-httpd-cvs-archive@www.apache.org Delivered-To: apmail-httpd-cvs-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 7266B98E0 for ; Thu, 26 Jan 2012 20:36:43 +0000 (UTC) Received: (qmail 3825 invoked by uid 500); 26 Jan 2012 20:36:42 -0000 Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org Received: (qmail 3759 invoked by uid 500); 26 Jan 2012 20:36:42 -0000 Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list cvs@httpd.apache.org Received: (qmail 3752 invoked by uid 99); 26 Jan 2012 20:36:41 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 26 Jan 2012 20:36:41 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=5.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 26 Jan 2012 20:36:40 +0000 Received: from eris.apache.org (localhost [127.0.0.1]) by eris.apache.org (Postfix) with ESMTP id D3ED2238890D; Thu, 26 Jan 2012 20:36:20 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: svn commit: r1236377 - in /httpd/site/trunk: docs/security/vulnerabilities_22.html xdocs/security/vulnerabilities-httpd.xml Date: Thu, 26 Jan 2012 20:36:20 -0000 To: cvs@httpd.apache.org From: mjc@apache.org X-Mailer: svnmailer-1.0.8-patched Message-Id: <20120126203620.D3ED2238890D@eris.apache.org> Author: mjc Date: Thu Jan 26 20:36:20 2012 New Revision: 1236377 URL: http://svn.apache.org/viewvc?rev=1236377&view=rev Log: Silly typo Modified: httpd/site/trunk/docs/security/vulnerabilities_22.html httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml Modified: httpd/site/trunk/docs/security/vulnerabilities_22.html URL: http://svn.apache.org/viewvc/httpd/site/trunk/docs/security/vulnerabilities_22.html?rev=1236377&r1=1236376&r2=1236377&view=diff ============================================================================== --- httpd/site/trunk/docs/security/vulnerabilities_22.html [utf-8] (original) +++ httpd/site/trunk/docs/security/vulnerabilities_22.html [utf-8] Thu Jan 26 20:36:20 2012 @@ -105,7 +105,7 @@ Fixed in Apache httpd 2.2.22-dev low: -mod_setenvif .htacess privilege escalation +mod_setenvif .htaccess privilege escalation CVE-2011-3607

Modified: httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml URL: http://svn.apache.org/viewvc/httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml?rev=1236377&r1=1236376&r2=1236377&view=diff ============================================================================== --- httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml [utf-8] (original) +++ httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml [utf-8] Thu Jan 26 20:36:20 2012 @@ -3,7 +3,7 @@ low -mod_setenvif .htacess privilege escalation +mod_setenvif .htaccess privilege escalation

An integer overflow flaw was found which, when the mod_setenvif module is enabled, could allow local users to gain privileges via a .htaccess