initial creation of patch page for CVE-2018

git-svn-id: https://svn.apache.org/repos/asf/vcl/site/trunk@1863951 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/content/patches/patching-CVE-2018.mdtext b/content/patches/patching-CVE-2018.mdtext
new file mode 100644
index 0000000..023ad59
--- /dev/null
+++ b/content/patches/patching-CVE-2018.mdtext
@@ -0,0 +1,70 @@
+Title:     Patching CVE-2018-11772, CVE-2018-11773, and CVE-2018-11774
+Notice:    Licensed to the Apache Software Foundation (ASF) under one
+           or more contributor license agreements.  See the NOTICE file
+           distributed with this work for additional information
+           regarding copyright ownership.  The ASF licenses this file
+           to you under the Apache License, Version 2.0 (the
+           "License"); you may not use this file except in compliance
+           with the License.  You may obtain a copy of the License at
+           .
+             http://www.apache.org/licenses/LICENSE-2.0
+           .
+           Unless required by applicable law or agreed to in writing,
+           software distributed under the License is distributed on an
+           "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+           KIND, either express or implied.  See the License for the
+           specific language governing permissions and limitations
+           under the License.
+
+Please see the [security page](/security.html) for more information about these patches.
+
+## Downloading
+Patches for Apache VCL versions 2.2.2, 2.3, 2.3.1, 2.3.2, 2.4.2, and 2.5 are all available in a
+single archive for all three of CVE-2018-11772, CVE-2018-11773, and CVE-2018-11774.
+
+* [CVE-2018-11772.tar.bz2](https://www.apache.org/dist/vcl/patches/CVE-2018-11772/CVE-2018-11772.tar.bz2)
+  [ [GPG](https://www.apache.org/dist/vcl/patches/CVE-2018-11772/CVE-2018-11772.tar.bz2.asc) ]
+  [ [SHA512](https://www.apache.org/dist/vcl/patches/CVE-2018-11772/CVE-2018-11772.tar.bz2.sha512) ]
+  (published on 2019-07-29)
+
+## Applying Patches
+The patches are only for the web code and therefore only need to be applied to
+that portion of the code.  To apply the patches, download the archive to the web
+server running your VCL code.  Extract it under /tmp.  It will generate a
+directory named CVE-2018-11772 (though it patches all 3 CVEs) with
+subdirectories for each VCL version under that.  Then, cd to where your web
+code is (probably something like /var/www/html/vcl).  You should be in the
+directory containing index.php, .ht-inc, and js.  Four files will be patched.
+So, you'll probably want to make backup copies of them before patching:
+
+    :::Text
+    .ht-inc/blockallocations.php
+    .ht-inc/privileges.php
+    .ht-inc/vm.php
+    js/vm.js
+
+You can see what version of VCL you have by running
+
+    :::Text
+    grep VCLversion index.php
+
+Finally, while still in the directory containing index.php, apply the patches
+for your version using a command similar to the following, substituting the
+proper version number.
+
+    :::Text
+    patch -p1 < /tmp/CVE-2018-11772/2.5/VCL-2.5-CVE-2018.patch
+
+You should see output similar to
+
+    :::Text
+    patching file .ht-inc/blockallocations.php
+    patching file .ht-inc/privileges.php
+    patching file .ht-inc/vm.php
+    patching file js/vm.js
+
+Patches to php files will take effect immediately - there is no need to
+restart httpd.  The patched vm.js file will take effect when users' browsers
+reload it.  There is no problem in having a delay in vm.js getting updated in
+users' browsers as it only affects an error message displayed to users if they
+attempt to submit invalid data.
\ No newline at end of file