add inline details
diff --git a/content/security/json/CVE-2022-28614.json b/content/security/json/CVE-2022-28614.json
index 911b151..c47c580 100644
--- a/content/security/json/CVE-2022-28614.json
+++ b/content/security/json/CVE-2022-28614.json
@@ -11,7 +11,7 @@
"DATE_PUBLIC": "",
"TITLE": "read beyond bounds via ap_rwrite() ",
"AKA": "",
- "STATE": "REVIEW"
+ "STATE": "PUBLIC"
},
"source": {
"defect": [],
@@ -67,7 +67,7 @@
"description": {
"description_data": [
{
- "value": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.",
+ "value": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.\n\nModules compiled and distributed separately from Apache HTTP Server that use the \"ap_rputs\" function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve\nthe issue.",
"lang": "eng"
}
]
@@ -76,7 +76,7 @@
"reference_data": [
{
"refsource": "CONFIRM",
- "url": "",
+ "url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"name": ""
}
]
@@ -108,15 +108,15 @@
"CVE_list": [],
"internal_comments": "",
"todo": [],
- "emailed": "",
- "userslist": "",
+ "emailed": "yes",
+ "userslist": "dev@httpd.apache.org",
"email": ""
},
"timeline": [
{
- "lang": "eng",
"time": "2022-06-08",
- "value": "2.4.54 released"
+ "lang": "eng",
+ "value": "released in 2.4.54"
}
]
}