xmlgraphics-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From lberna...@apache.org
Subject svn commit: r1667128 - /xmlgraphics/site/trunk/content/security.mdtext
Date Mon, 16 Mar 2015 20:47:05 GMT
Author: lbernardo
Date: Mon Mar 16 20:47:04 2015
New Revision: 1667128

URL: http://svn.apache.org/r1667128
Log:
made look of security page more in line with the other pages. also removed some content.

Modified:
    xmlgraphics/site/trunk/content/security.mdtext

Modified: xmlgraphics/site/trunk/content/security.mdtext
URL: http://svn.apache.org/viewvc/xmlgraphics/site/trunk/content/security.mdtext?rev=1667128&r1=1667127&r2=1667128&view=diff
==============================================================================
--- xmlgraphics/site/trunk/content/security.mdtext (original)
+++ xmlgraphics/site/trunk/content/security.mdtext Mon Mar 16 20:47:04 2015
@@ -2,7 +2,7 @@ Title: The Apache™ XML Graphics Pr
 
 #The Apache™ XML Graphics Project - Security
 
-## Security { #Security}
+## Published Vulnerabilities { #PublishedVulnerabilities}
 
 The *Apache™ XML Graphics Project* has collected its Security related information
for all of its sub-projects to this page.
 
@@ -18,31 +18,19 @@ At the time of the most recent update, t
 
 At the time of the most recent update, the [Apache  XML Graphics Commons Project](http://xmlgraphics.apache.org/commons/)
has no published vulnerabilities.
 
-#Security Updates { #SecurityUpdates}
+##Reporting New Security Problems with the Apache XML Graphics Sub Projects { #ReportingSecurityProblems}
 
-To get notification of when new security issues are fixed, join the [Apache XML Graphics
General Mailing](http://xmlgraphics.apache.org/mail.html#xmlgraphics-general) list
-
-#Reporting New Security Problems with the Apache XML Graphics Projects & Sub Projects
{ #ReportingSecurityProblems}
-
-Reporting New Security Problems with the Apache HTTP Server
-The Apache Software Foundation takes a very active stance in eliminating security problems
and denial of service attacks against the Apache HTTP server.
-
-We strongly encourage folks to report such problems to the private security mailing list
of the ASF Security Team, before disclosing them in a public forum.
-
-Please see the page of the [ASF Security Team](http://www.apache.org/security/) for further
information and contact information.
+Please report problems to the private security mailing list of the ASF Security Team, before
disclosing them in a public forum. See the page of the [ASF Security Team](http://www.apache.org/security/)
for further information and contact information.
 
 **IMPORTANT**
 
-  * **The Security Team cannot accept regular bug reports or other queries, we ask that you
use our [bug reporting page](http://xmlgraphics.apache.org/commons/bugs.html) for those.**

+  * **The ASF Security Team cannot accept regular bug reports or other queries. We ask that
you use our [bug reporting page](http://xmlgraphics.apache.org/commons/bugs.html) for those.**
   * **All mail sent to the Security Team that does not relate to security problems in Apache
software will be ignored.**
 
 **VERY IMPORTANT**
 
-  * *Do not submit security reports regarding vulnerabilities to our bug reporting system.
This may inadvertently publicize the security vulnerability. Instead follow the steps on the
[ASF Security Page](http://www.apache.org/security/).*
-
-
-Note that all networked servers are subject to Distributed Denial of Service (DDOS) attacks,
and we cannot promise magic workarounds to generic problems (such as a client streaming lots
of data to your server, or re-requesting the same URL repeatedly). In general our philosophy
is to avoid any attacks which can cause the server to consume resources in a non-linear relationship
to the size of inputs.
+  * **Do not submit security reports regarding vulnerabilities to our bug reporting system.
This may inadvertently publicize the security vulnerability. Instead follow the steps on the
[ASF Security Page](http://www.apache.org/security/).**
 
-#Security Standards { #SecurityStandards}
+##Security Standards { #SecurityStandards}
 
-Apache XML Graphics Project vulnerabilities are labelled with [CVE](http://cve.mitre.org/)
(Common Vulnerabilities and Exposures) identifiers.
+Apache XML Graphics Project vulnerabilities are labeled with [CVE](http://cve.mitre.org/)
(Common Vulnerabilities and Exposures) identifiers.



---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@xmlgraphics.apache.org
For additional commands, e-mail: commits-help@xmlgraphics.apache.org


Mime
View raw message