httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From j..@apache.org
Subject cvs commit: httpd-dist .htaccess Announcement.html Announcement.txt HEADER.html README.html
Date Wed, 02 Oct 2002 18:03:14 GMT
jim         2002/10/02 11:03:14

  Modified:    .        .htaccess Announcement.html Announcement.txt
                        HEADER.html README.html
  Log:
  Get ready for announcement. DO NOT UPDATE SITE YET, but these are
  here for the 2.0 to be based on!!!
  
  Revision  Changes    Path
  1.81      +4 -4      httpd-dist/.htaccess
  
  Index: .htaccess
  ===================================================================
  RCS file: /home/cvs/httpd-dist/.htaccess,v
  retrieving revision 1.80
  retrieving revision 1.81
  diff -u -r1.80 -r1.81
  --- .htaccess	24 Sep 2002 22:32:49 -0000	1.80
  +++ .htaccess	2 Oct 2002 18:03:14 -0000	1.81
  @@ -20,11 +20,11 @@
   AddDescription "Documentation in PDF - pkzipped" pdf
   AddDescription "Apache 2.0 Release Note" Announcement2
   AddDescription "Apache 1.3 Release Note" Announcement
  -AddDescription "Current Release 1.3.24" apache_1.3.24   apache_1_3_24_
  +AddDescription "Current Release 1.3.27" apache_1.3.27   apache_1_3_27_
   AddDescription "Patch to fix mod_rewrite" apache_1.3.*-fix.diff
  -AddDescription "1.3.24 compressed source" apache_1.3.24.tar.Z
  -AddDescription "1.3.24 gzipped source" apache_1.3.24.tar.gz
  -AddDescription "1.3.24 pkzipped source" apache_1.3.24.zip
  +AddDescription "1.3.27 compressed source" apache_1.3.27.tar.Z
  +AddDescription "1.3.27 gzipped source" apache_1.3.27.tar.gz
  +AddDescription "1.3.27 pkzipped source" apache_1.3.27.zip
   AddDescription "2.0.42 compressed source" httpd-2.0.42.tar.Z
   AddDescription "2.0.42 gzipped source" httpd-2.0.42.tar.gz
   AddDescription "Source code for Win32 compilers" *-win32-src.zip
  
  
  
  1.10      +117 -73   httpd-dist/Announcement.html
  
  Index: Announcement.html
  ===================================================================
  RCS file: /home/cvs/httpd-dist/Announcement.html,v
  retrieving revision 1.9
  retrieving revision 1.10
  diff -u -r1.9 -r1.10
  --- Announcement.html	18 Jun 2002 18:25:02 -0000	1.9
  +++ Announcement.html	2 Oct 2002 18:03:14 -0000	1.10
  @@ -15,30 +15,47 @@
   <IMG SRC="../../images/apache_sub.gif" ALT="">
   
   
  -<h1>Apache 1.3.26 Released</h1>
  +<h1>Apache 1.3.27 Released</h1>
                                          
   <p>The Apache Software Foundation and The Apache Server Project are
  -   pleased to announce the release of version 1.3.26 of the Apache HTTP
  -   Server. This Announcement notes the significant changes in 1.3.26.</p>
  -
  -<p>This version of Apache is principally a security and bug fix
  -   release.  A summary of the bug fixes is given at the end of this document.
  -   Of particular note is that 1.3.26 addresses and fixes the issues noted
  -   in <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0392">
  -   CAN-2002-0392 (mitre.org)</a>
  -   [<a href="http://www.cert.org/advisories/CA-2002-17.html">CERT VU#944335</a>]
  -   regarding a vulnerability in the handling of chunked transfer encoding.
  -   We would like to thank Mark Litchfield of ngssoftware.com for discovering
  -   and reporting the vulnerability.</p>
  +   pleased to announce the release of version 1.3.27 of the Apache HTTP
  +   Server.  This Announcement notes the significant changes in 1.3.27
  +   as compared to 1.3.26.</p>
  +
  +<p>This version of Apache is principally a security and bug fix release.
  +   A summary of the bug fixes is given at the end of this document.
  +   Of particular note is that 1.3.27 addresses and fixes 3 security
  +   vulnerabilities.</p>
  +<p>
  +   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839">CAN-2002-0839
(cve.mitre.org)</a>:
  +   A vulnerability exists in all versions of
  +   Apache prior to 1.3.27 on platforms using System V shared memory based
  +   scoreboards.  This vulnerability allows an attacker who can execute under
  +   the Apache UID to exploit the Apache shared memory scoreboard format and
  +   send a signal to any process as root or cause a local denial of service
  +   attack.  We thank iDefense for their responsible notification and 
  +   disclosure of this issue.</p>
  +<p>
  +   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840">CAN-2002-0840
(cve.mitre.org)</a>:
  +   Apache is susceptible to a cross site
  +   scripting vulnerability in the default 404 page of any web server hosted
  +   on a domain that allows wildcard DNS lookups.  We thank Matthew Murphy for
  +   the responsible notification and disclosure of this issue.</p>
  +<p>
  +   <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843">CAN-2002-0843
(cve.mitre.org)</a>:
  +   There were some possible overflows in ab.c
  +   which could be exploited by a malicious server. Note that this
  +   vulnerability is not in Apache itself, but rather one of the support
  +   programs bundled with Apache. We thank David Wagner for the responsible
  +   notification and disclosure of this issue.
  +</p>
   
  -<p>We consider Apache 1.3.26 to be the best version of Apache 1.3 available
  +<p>We consider Apache 1.3.27 to be the best version of Apache 1.3 available
      and we strongly recommend that users of older versions, especially of
  -   the 1.1.x and 1.2.x family, upgrade as soon as possible. No further
  -   releases will be made in the 1.2.x family.  Users should also consider
  -   upgrading to Apache 2.0 as soon as all of the modules they need become
  -   available for 2.0.</p>
  +   the 1.1.x and 1.2.x family, upgrade as soon as possible.  No further
  +   releases will be made in the 1.2.x family.</p>
   
  -<p>Apache 1.3.26 is available for download from</p>
  +<p>Apache 1.3.27 is available for download from</p>
   <pre>   
   
          http://www.apache.org/dist/httpd/
  @@ -59,22 +76,17 @@
   </pre>
   
   <p>     
  -   As of Apache 1.3.17, Win32 binary distributions are now based on the
  -   Microsoft Installer (.MSI) technology.  This change occurred in order
  -   to resolve the many problems WinME and Win2K users experienced with
  -   the older InstallShield-based installer.exe file.  While development
  -   continues to make this new installation method more robust, questions
  -   should be directed at the news:comp.infosystems.www.servers.ms-windows
  -   newsgroup.  
  -</p>
  -<p>
      As of Apache 1.3.12 binary distributions contain all standard Apache
      modules as shared objects (if supported by the platform) and include
  -   full source code. Installation is easily done by executing the
  -   included install script. See the README.bindist and INSTALL.bindist
  -   files for a complete explanation. Please note that the binary
  +   full source code.  Installation is easily done by executing the
  +   included install script.  See the README.bindist and INSTALL.bindist
  +   files for a complete explanation.  Please note that the binary
      distributions are only provided for your convenience and current
  -   distributions for specific platforms are not always available.
  +   distributions for specific platforms are not always available. Win32
  +   binary distributions are based on the Microsoft Installer (.MSI)
  +   technology.  While development continues to make this installation method
  +   more robust, questions should be directed to the
  +   news:comp.infosystems.www.servers.ms-windows newsgroup.
   </p>
   <p>   
      For an overview of new features introduced after 1.2 please see
  @@ -94,71 +106,103 @@
      variants.
   </p>
   <p>   
  -   IMPORTANT NOTE FOR WIN32 USERS: Over the years, many users have come
  -   to trust Apache as a secure and stable server. It must be realized
  -   that the current Win32 code has not yet reached the levels of the Unix
  -   version, but is of acceptable quality.  Win32 stability or security 
  -   problems do not reflect on the Unix version.
  +   IMPORTANT NOTE FOR APACHE USERS:   Apache 1.3 was designed for Unix OS
  +   variants.  While  the ports to non-Unix platforms (such as Win32, Netware
  +   or OS2) are of an acceptable quality, Apache 1.3 is not optimized for
  +   these platforms.  Security, stability, or performance issues on these
  +   non-Unix ports do not generally apply to the Unix version, due to
  +   software's Unix origin.
  +</p>
  +<p>Apache 2.0 has been structured for multiple operating systems from its 
  +   inception, by introducing the Apache Portability Library and MPM modules.
  +   Users on non-Unix platforms are strongly encouraged to move up to 
  +   Apache 2.0 for better performance, stability and security on their
  +   platforms.
   </p>
  -<h1>Apache 1.3.26 Major changes</h1>
  +<h1>Apache 1.3.27 Major changes</h1>
   <h3>Security vulnerabilities</h3>
   
   <p>
  -   The main security vulnerabilities addressed in 1.3.26 are:
  +   The main security vulnerabilities addressed in 1.3.27 are:
   </p>
   <ul>
  -    <li>Fix the security vulnerability noted in CAN-2002-0392 (mitre.org)
  -        regarding the handling of chunked transfer encoding.</li>
  +     <li>Fix the security vulnerability noted in CAN-2002-0839 (cve.mitre.org)
  +       regarding ownership permissions of System V shared memory based
  +       scoreboards.  The fix resulted in the new <code>ShmemUIDisUser</code>
directive.</li>
  +
  +     <li>Fix the security vulnerability noted in CAN-2002-0840 (cvs.mitre.org)
  +       regarding a cross-site scripting vulnerability in the default error
  +       page when using wildcard DNS.</li>
  +
  +     <li>Fix the security vulnerability noted in CAN-2002-0843 (cve.mitre.org)
  +       regarding some possible overflows in ab.c which could be exploited by
  +       a malicious server.</li>
   </ul>
   
   <h3>New features</h3>
   <p>
  -   The main new features in 1.3.26 (compared to 1.3.24) are:
  +   The main new features in 1.3.27 (compared to 1.3.26) are:
   </p>
   <ul>
  -     <li>Add some popular types to the mime types magic file.</li>
  +     <li>The new <code>ErrorHeader</code> directive has been added.</li>
  +
  +     <li>Configuration file globbing can now use simple pattern
  +       matching.</li>
  +
  +     <li>The protocol version (eg: <code>HTTP/1.1</code>) in the request
line parsing
  +       is now case insensitive.</li>
  +
  +     <li><code>ap_snprintf()</code> can now distinguish between an output
which was
  +       truncated, and an output which exactly filled the buffer.</li>
  +
  +     <li>Add <code>ProtocolReqCheck</code> directive, which determines
if Apache will
  +       check for a valid protocol string in the request (eg: <code>HTTP/1.1</code>)
  +       and return <code>HTTP_BAD_REQUEST</code> if not valid. Versions of Apache
  +       prior to 1.3.26 would silently ignore bad protocol strings, but
  +       1.3.26 included a more strict check. This makes it runtime
  +       configurable.</li>
  +
  +     <li>Added support for Berkeley-DB/4.x to mod_auth_db.</li>
  +
  +     <li>httpd -V will now also print out the compile time defined
  +       HARD_SERVER_LIMIT value.</li>
   </ul>
   
   <p>
      New features that relate to specific platforms:
   </p>
   <ul>
  -     <li>Unix: Added a '-F' flag which causes the supervisor process to
  -         no longer fork down and detach and instead stay attached to
  -         the tty - thus making live for automatic restart and exit checking
  -         code easier.</li>
  +     <li>Support Caldera OpenUNIX 8.</li>
  +     
  +     <li>Use SysV semaphores by default on OpenBSD.</li>
  +
  +     <li>Implemented file locking in mod_rewrite for the NetWare
  +       CLib platform.</li>
   </ul>
   <p>
   <h3>Bugs fixed</h3>
   <p>
  -   The following bugs were found in Apache 1.3.24 and have been fixed in
  -   Apache 1.3.26:
  +   The following bugs were found in Apache 1.3.26 and have been fixed in
  +   Apache 1.3.27:
   </p>
   <ul>
  -     <li>Allow child processes sufficient time for cleanups but making
  -         ap_select in reclaim_child_processes more "resistant" to
  -         signal interupts.</li>
  -
  -     <li>Fix for a problem in mod_rewrite which would lead to 400 Bad Request
  -         responses for rewriting rules which resulted in a local path.
  -         Note: This will also reject invalid requests as issued by
  -         Netscape-4.x Roaming Profiles (on a DAV-enabled server)</li>
  -
  -     <li>Recognize platform-specific root directories (other than
  -         leading slash) in mod_rewrite for filename rewrite rules.</li>
  -
  -     <li>Disallow anything but whitespace on the request line after the
  -         HTTP/x.y protocol string to prevent arbitrary user input from
  -         ending up in the access_log and error_log.  Also control characters
  -         are now escaped.</li>
  -
  -     <li>A large number of fixes in mod_proxy including: adding support
  -         for dechunking chunked responses, correcting a timeout problem
  -         which would force long or slow POST requests to close after 300
  -         seconds, adding "X-Forwarded" headers, dealing correctly with the
  -         multiple-cookie header bug, ability to handle unexpected
  -         100-continue responses sent during PUT or POST commands, and a
  -         change to tighten up the Server header overwrite bugfix.</li>
  +     <li>mod_proxy fixes:
  +        <ul>
  +        <li>The cache in mod_proxy was incorrectly updating the Content-Length
  +          value from 304 responses when doing validation.</li>
  +        <li>Fix a problem in proxy where headers from other modules were
  +          added to the response headers when this was already done in the
  +          core already.</li>
  +        </ul>
  +
  +     <li>In 1.3.26, a null or all blank Content-Length field would be
  +       triggered as an error; previous versions would silently ignore
  +       this and assume 0.  1.3.27 restores this previous behavior.</li>
  +
  +     <li>Win32: Fix one byte buffer overflow in ap_get_win32_interpreter
  +       when a CGI script's #! line does not contain a \r or \n (i.e.
  +       a line feed character) in the first 1023 bytes. The overflow
  +       is always a '\0' (string termination) character.</li>
   </ul>
   
   </BODY>
  
  
  
  1.9       +107 -66   httpd-dist/Announcement.txt
  
  Index: Announcement.txt
  ===================================================================
  RCS file: /home/cvs/httpd-dist/Announcement.txt,v
  retrieving revision 1.8
  retrieving revision 1.9
  diff -u -r1.8 -r1.9
  --- Announcement.txt	18 Jun 2002 18:25:02 -0000	1.8
  +++ Announcement.txt	2 Oct 2002 18:03:14 -0000	1.9
  @@ -1,26 +1,41 @@
   
  -                            Apache 1.3.26 Released
  +                            Apache 1.3.27 Released
   
      The Apache Software Foundation and The Apache Server Project are
  -   pleased to announce the release of version 1.3.26 of the Apache HTTP
  -   Server.  This Announcement notes the significant changes in 1.3.26.
  -
  -   This version of Apache is principally a security and bug fix
  -   release.  A summary of the bug fixes is given at the end of this document.
  -   Of particular note is that 1.3.26 addresses and fixes the issues noted
  -   in CAN-2002-0392 (mitre.org) [CERT VU#944335] regarding a vulnerability
  -   in the handling of chunked transfer encoding.  We would like to thank
  -   Mark Litchfield of ngssoftware.com for discovering and reporting the
  -   vulnerability.
  +   pleased to announce the release of version 1.3.27 of the Apache HTTP
  +   Server.  This Announcement notes the significant changes in 1.3.27
  +   as compared to 1.3.26.
  +
  +   This version of Apache is principally a security and bug fix release.
  +   A summary of the bug fixes is given at the end of this document.
  +   Of particular note is that 1.3.27 addresses and fixes 3 security
  +   vulnerabilities.
  +
  +   CAN-2002-0839 (cve.mitre.org): A vulnerability exists in all versions of
  +   Apache prior to 1.3.27 on platforms using System V shared memory based
  +   scoreboards.  This vulnerability allows an attacker who can execute under
  +   the Apache UID to exploit the Apache shared memory scoreboard format and
  +   send a signal to any process as root or cause a local denial of service
  +   attack.  We thank iDefense for their responsible notification and 
  +   disclosure of this issue.
  +
  +   CAN-2002-0840 (cve.mitre.org): Apache is susceptible to a cross site
  +   scripting vulnerability in the default 404 page of any web server hosted
  +   on a domain that allows wildcard DNS lookups.  We thank Matthew Murphy for
  +   the responsible notification and disclosure of this issue.
  +   
  +   CAN-2002-0843 (cve.mitre.org): There were some possible overflows in ab.c
  +   which could be exploited by a malicious server. Note that this
  +   vulnerability is not in Apache itself, but rather one of the support
  +   programs bundled with Apache. We thank David Wagner for the responsible
  +   notification and disclosure of this issue.
   
  -   We consider Apache 1.3.26 to be the best version of Apache 1.3 available
  +   We consider Apache 1.3.27 to be the best version of Apache 1.3 available
      and we strongly recommend that users of older versions, especially of
  -   the 1.1.x and 1.2.x family, upgrade as soon as possible. No further
  -   releases will be made in the 1.2.x family.  Users should also consider
  -   upgrading to Apache 2.0 as soon as all of the modules they need become
  -   available for 2.0.
  +   the 1.1.x and 1.2.x family, upgrade as soon as possible.  No further
  +   releases will be made in the 1.2.x family.
   
  -   Apache 1.3.26 is available for download from
  +   Apache 1.3.27 is available for download from
      
          http://www.apache.org/dist/httpd/
   
  @@ -36,21 +51,17 @@
   
          http://www.apache.org/mirrors/
   
  -   As of Apache 1.3.17, Win32 binary distributions are now based on the
  -   Microsoft Installer (.MSI) technology.  This change occurred in order to
  -   resolve the many problems WinME and Win2K users experienced with the
  -   older InstallShield-based installer.exe file.  While development
  -   continues to make this new installation method more robust, questions
  -   should be directed at the news:comp.infosystems.www.servers.ms-windows
  -   newsgroup.
  -
      As of Apache 1.3.12 binary distributions contain all standard Apache
      modules as shared objects (if supported by the platform) and include
      full source code.  Installation is easily done by executing the
      included install script.  See the README.bindist and INSTALL.bindist
      files for a complete explanation.  Please note that the binary
      distributions are only provided for your convenience and current
  -   distributions for specific platforms are not always available.
  +   distributions for specific platforms are not always available. Win32
  +   binary distributions are based on the Microsoft Installer (.MSI)
  +   technology.  While development continues to make this installation method
  +   more robust, questions should be directed to the
  +   news:comp.infosystems.www.servers.ms-windows newsgroup.
   
      For an overview of new features introduced after 1.2 please see
      
  @@ -66,59 +77,89 @@
      of the servers on the Internet are running Apache or one of its
      variants.
   
  -   IMPORTANT NOTE FOR WIN32 USERS: Over the years, many users have come
  -   to trust Apache as a secure and stable server.  It must be realized
  -   that the current Win32 code has not yet reached the levels of the Unix
  -   version, but is of acceptable quality.  Win32 stability or security
  -   problems do not reflect on the Unix version.
  +   IMPORTANT NOTE FOR APACHE USERS:   Apache 1.3 was designed for Unix OS
  +   variants.  While  the ports to non-Unix platforms (such as Win32, Netware
  +   or OS2) are of an acceptable quality, Apache 1.3 is not optimized for
  +   these platforms.  Security, stability, or performance issues on these
  +   non-Unix ports do not generally apply to the Unix version, due to
  +   software's Unix origin.
  +
  +   Apache 2.0 has been structured for multiple operating systems from its 
  +   inception, by introducing the Apache Portability Library and MPM modules.
  +   Users on non-Unix platforms are strongly encouraged to move up to 
  +   Apache 2.0 for better performance, stability and security on their
  +   platforms.
   
  -                     Apache 1.3.26 Major changes
  +                     Apache 1.3.27 Major changes
   
     Security vulnerabilities
   
  -     * Fix the security vulnerability noted in CAN-2002-0392 (mitre.org)
  -       regarding the handling of chunked transfer encoding.
  +     * Fix the security vulnerability noted in CAN-2002-0839 (cve.mitre.org)
  +       regarding ownership permissions of System V shared memory based
  +       scoreboards.  The fix resulted in the new ShmemUIDisUser directive.
  +
  +     * Fix the security vulnerability noted in CAN-2002-0840 (cvs.mitre.org)
  +       regarding a cross-site scripting vulnerability in the default error
  +       page when using wildcard DNS.
  +
  +     * Fix the security vulnerability noted in CAN-2002-0843 (cve.mitre.org)
  +       regarding some possible overflows in ab.c which could be exploited by
  +       a malicious server.
   
     New features
   
  -   The main new features in 1.3.26 (compared to 1.3.24) are:
  +   The main new features in 1.3.27 (compared to 1.3.26) are:
  +
  +     * The new ErrorHeader directive has been added.
  +
  +     * Configuration file globbing can now use simple pattern
  +       matching.
   
  -     * Add some popular types to the mime types magic file.
  +     * The protocol version (eg: HTTP/1.1) in the request line parsing
  +       is now case insensitive.
  +
  +     * ap_snprintf() can now distinguish between an output which was
  +       truncated, and an output which exactly filled the buffer.
  +
  +     * Add ProtocolReqCheck directive, which determines if Apache will
  +       check for a valid protocol string in the request (eg: HTTP/1.1)
  +       and return HTTP_BAD_REQUEST if not valid. Versions of Apache
  +       prior to 1.3.26 would silently ignore bad protocol strings, but
  +       1.3.26 included a more strict check. This makes it runtime
  +       configurable.
  +
  +     * Added support for Berkeley-DB/4.x to mod_auth_db.
  +
  +     * httpd -V will now also print out the compile time defined
  +       HARD_SERVER_LIMIT value.
   
      New features that relate to specific platforms:
   
  -     * Unix: Added a '-F' flag which causes the supervisor process to
  -       no longer fork down and detach and instead stay attached to
  -       the tty - thus making live for automatic restart and exit checking
  -       code easier.
  +     * Support Caldera OpenUNIX 8.
  +     
  +     * Use SysV semaphores by default on OpenBSD.
  +
  +     * Implemented file locking in mod_rewrite for the NetWare
  +       CLib platform.
   
     Bugs fixed
   
  -   The following bugs were found in Apache 1.3.24 (or earlier) and have
  -   been fixed in Apache 1.3.26:
  +   The following bugs were found in Apache 1.3.26 (or earlier) and have
  +   been fixed in Apache 1.3.27:
   
  -     * Allow child processes sufficient time for cleanups but making
  -       ap_select in reclaim_child_processes more "resistant" to
  -       signal interupts.
  -
  -     * Fix for a problem in mod_rewrite which would lead to 400 Bad Request
  -       responses for rewriting rules which resulted in a local path.
  -       Note: This will also reject invalid requests as issued by
  -       Netscape-4.x Roaming Profiles (on a DAV-enabled server)
  -
  -     * Recognize platform-specific root directories (other than
  -       leading slash) in mod_rewrite for filename rewrite rules.
  -
  -     * Disallow anything but whitespace on the request line after the
  -       HTTP/x.y protocol string to prevent arbitrary user input from
  -       ending up in the access_log and error_log.  Also control characters
  -       are now escaped.
  -
  -     * A large number of fixes in mod_proxy including: adding support
  -       for dechunking chunked responses, correcting a timeout problem
  -       which would force long or slow POST requests to close after 300
  -       seconds, adding "X-Forwarded" headers, dealing correctly with the
  -       multiple-cookie header bug, ability to handle unexpected
  -       100-continue responses sent during PUT or POST commands, and a
  -       change to tighten up the Server header overwrite bugfix.
  +     * mod_proxy fixes:
  +        - The cache in mod_proxy was incorrectly updating the Content-Length
  +          value from 304 responses when doing validation.
  +        - Fix a problem in proxy where headers from other modules were
  +          added to the response headers when this was already done in the
  +          core already.
  +
  +     * In 1.3.26, a null or all blank Content-Length field would be
  +       triggered as an error; previous versions would silently ignore
  +       this and assume 0.  1.3.27 restores this previous behavior.
  +
  +     * Win32: Fix one byte buffer overflow in ap_get_win32_interpreter
  +       when a CGI script's #! line does not contain a \r or \n (i.e.
  +       a line feed character) in the first 1023 bytes. The overflow
  +       is always a '\0' (string termination) character.
   
  
  
  
  1.29      +1 -1      httpd-dist/HEADER.html
  
  Index: HEADER.html
  ===================================================================
  RCS file: /home/cvs/httpd-dist/HEADER.html,v
  retrieving revision 1.28
  retrieving revision 1.29
  diff -u -r1.28 -r1.29
  --- HEADER.html	24 Sep 2002 22:32:49 -0000	1.28
  +++ HEADER.html	2 Oct 2002 18:03:14 -0000	1.29
  @@ -13,7 +13,7 @@
   <li><a href="#mirrors">Download from your nearest mirror site!</a></li>
   <li><a href="#binaries">Binary Releases</a></li>
   <li><a href="#apache20">Apache 2.0.42 is the best available version.</a></li>
  -<li><a href="#apache13">Apache 1.3.26 is also available.</a></li>
  +<li><a href="#apache13">Apache 1.3.27 is also available.</a></li>
   <li><a href="#sig">PGP Signatures</a></li>
   <li><a href="#patches">Official Patches</a></li>
   <li><a href="#contrib">Contributed Patches/Modules/Code</a></li>
  
  
  
  1.27      +11 -8     httpd-dist/README.html
  
  Index: README.html
  ===================================================================
  RCS file: /home/cvs/httpd-dist/README.html,v
  retrieving revision 1.26
  retrieving revision 1.27
  diff -u -r1.26 -r1.27
  --- README.html	24 Sep 2002 22:32:49 -0000	1.26
  +++ README.html	2 Oct 2002 18:03:14 -0000	1.27
  @@ -33,18 +33,21 @@
      packages.</strong>  See the <a href="binaries/win32/">binaries/win32/</a>

      directory for the Windows binary distributions.</p>
   
  -<h2><a name="apache13"><a href="Announcement.html">Apache 1.3.26</a>

  +<h2><a name="apache13"><a href="Announcement.html">Apache 1.3.27</a>

       is also available.</a></h2>
   
  -<p>Apache 1.3.26 is the best available version of the 1.3 series, and is
  +<p>Apache 1.3.27 is the best available version of the 1.3 series, and is
      recommended over all previous 1.3 releases.</p>
   
  -<p>This release fixes a security problem as described in our recent
  -   <a href="http://httpd.apache.org/info/security_bulletin_20020617.txt">
  -   security bulletin</a>, and all users of Apache 1.3 and prior are urged to
  +<p>This release fixes 3 security problems as described in
  +   CAN-2002-0839, CAN-2002-0840 and CAN-2002-0843 on
  +   <a href="http://cvs.mitre.org">cvs.mitre.org</a>. It also
  +   fixes some bugs from 1.3.26 (and earlier) as well as adding
  +   some additional capability.
  +   All users of Apache 1.3 and prior are urged to
      upgrade as soon as possible.</p>
   
  -<p>Use the Apache 1.3.26 version if you need to use third party modules that 
  +<p>Use the Apache 1.3.27 version if you need to use third party modules that 
      are not yet available as an Apache 2.0 module.  Apache 1.3 is not 
      compatible with Apache 2.0 modules.</p>
   
  @@ -59,10 +62,10 @@
   
   <pre>Always signatures to validate package authenticity, <i>e.g.</i>,
   % pgpk -a KEYS
  -% pgpv apache_1.3.26.tar.gz.asc
  +% pgpv apache_1.3.27.tar.gz.asc
   <i>or</i>,
   % pgp -ka KEYS
  -% pgp apache_1.3.26.tar.gz.asc
  +% pgp apache_1.3.27.tar.gz.asc
   </PRE>
   
   <p>We offer MD5 hashes as an alternative to validate the integrity
  
  
  

Mime
View raw message