httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From stri...@apache.org
Subject cvs commit: httpd-dist/tools release.sh
Date Wed, 09 Jul 2003 11:11:13 GMT
striker     2003/07/09 04:11:12

  Modified:    .        .htaccess Announcement2.html Announcement2.txt
                        README.html
               binaries/win32 HEADER.html README.html
               tools    release.sh
  Log:
  Update for 2.0.47 release.
  
  Revision  Changes    Path
  1.86      +2 -2      httpd-dist/.htaccess
  
  Index: .htaccess
  ===================================================================
  RCS file: /home/cvs/httpd-dist/.htaccess,v
  retrieving revision 1.85
  retrieving revision 1.86
  diff -u -r1.85 -r1.86
  --- .htaccess	28 May 2003 05:47:23 -0000	1.85
  +++ .htaccess	9 Jul 2003 11:11:11 -0000	1.86
  @@ -26,8 +26,8 @@
   AddDescription "1.3.27 compressed source" apache_1.3.27.tar.Z
   AddDescription "1.3.27 gzipped source" apache_1.3.27.tar.gz
   AddDescription "1.3.27 pkzipped source" apache_1.3.27.zip
  -AddDescription "2.0.46 compressed source" httpd-2.0.46.tar.Z
  -AddDescription "2.0.46 gzipped source" httpd-2.0.46.tar.gz
  +AddDescription "2.0.47 compressed source" httpd-2.0.47.tar.Z
  +AddDescription "2.0.47 gzipped source" httpd-2.0.47.tar.gz
   AddDescription "Source code for Win32 compilers" *-win32-src.zip
   AddDescription "Flood 0.4 source" flood-0.4.tar.gz
   AddDescription "Installer Package" *.exe
  
  
  
  1.40      +72 -187   httpd-dist/Announcement2.html
  
  Index: Announcement2.html
  ===================================================================
  RCS file: /home/cvs/httpd-dist/Announcement2.html,v
  retrieving revision 1.39
  retrieving revision 1.40
  diff -u -r1.39 -r1.40
  --- Announcement2.html	28 May 2003 05:47:23 -0000	1.39
  +++ Announcement2.html	9 Jul 2003 11:11:11 -0000	1.40
  @@ -14,52 +14,45 @@
   >
   <img src="../../images/apache_sub.gif" alt="">
   
  -<h1>Apache 2.0.46 Released</h1>
  +<h1>Apache 2.0.47 Released</h1>
   
   <p>The Apache Software Foundation and the Apache HTTP Server Project are
  -   pleased to announce the ninth public release of the Apache 2.0
  +   pleased to announce the tenth public release of the Apache 2.0
      HTTP Server.  This Announcement notes the significant changes in
  -   2.0.46 as compared to 2.0.45.</p>
  +   2.0.47 as compared to 2.0.46.</p>
   
   <p>This version of Apache is principally a security and bug fix release.
      A summary of the bug fixes is given at the end of this document.
  -   Of particular note is that 2.0.46 addresses two security
  +   Of particular note is that 2.0.47 addresses four security
      vulnerabilities:</p>
   
  -<p>Apache 2.0 versions 2.0.37 through 2.0.45 can be caused to crash in
  -   certain circumstances.  This can be triggered remotely through mod_dav
  -   and possibly other mechanisms.  The crash was originally reported by
  -   David Endler &lt;DEndler@iDefense.com&gt; and was researched and fixed by
  -   Joe Orton &lt;jorton@redhat.com&gt;.  Specific details and an analysis of the
  -   crash will be published Friday, May 30.  No more specific information
  -   is disclosed at this time, but all Apache 2.0 users are encouraged to
  -   upgrade now.<br>
  -   <code>[<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245</a>]</code></p>
  -  
  -<p>Apache 2.0 versions 2.0.40 through 2.0.45 on Unix platforms were
  -   vulnerable to a denial-of-service attack on the basic authentication
  -   module, which was reported by John Hughes &lt;john.hughes@entegrity.com&gt;.
  -   A bug in the configuration scripts caused the <code>apr_password_validate()</code>
  -   function to be thread-unsafe on platforms with <code>crypt_r()</code>, including
  -   AIX and Linux.  All versions of Apache 2.0 have this thread-safety
  -   problem on platforms with no <code>crypt_r()</code> and no thread-safe <code>crypt()</code>,
  -   such as Mac OS X and possibly others.  When using a threaded MPM (which
  -   is not the default on these platforms), this allows remote attackers
  -   to create a denial of service which causes valid usernames and
  -   passwords for Basic Authentication to fail until Apache is restarted.
  -   We do not believe this bug could allow unauthorized users to gain
  -   access to protected resources.<br>
  -   <code>[<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0189">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0189</a>]</code></p>
  +<p>Certain sequences of per-directory renegotiations and the SSLCipherSuite
  +   directive being used to upgrade from a weak ciphersuite to a strong one
  +   could result in the weak ciphersuite being used in place of the strong
  +   one.<br>
  +   <code>[<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0192">CAN-2003-0192</a>]</code></p>
  +
  +<p>Certain errors returned by accept() on rarely accessed ports could cause
  +   temporal denial of service, due to a bug in the prefork MPM.<br>
  +   <code>[<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253">CAN-2003-0253</a>]</code></p>
  +
  +<p>Denial of service was caused when target host is IPv6 but ftp proxy
  +   server can't create IPv6 socket.<br>
  +   <code>[<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254">CAN-2003-0254</a>]</code></p>
  +
  +<p>The server would crash when going into an infinite loop due to too many
  +   subsequent internal redirects and nested subrequests.<br>
  +   <code>[VU#379828]</code></p>
   
  -<p>The Apache Software Foundation would like to thank David Endler
  -   and John Hughes for the responsible reporting of these issues.</p>
  +<p>The Apache Software Foundation would like to thank Saheed Akhtar and
  +   Yoshioka Tsuneo for the responsible reporting of two of these issues.</p>
   
   
   <p>This release is compatible with modules compiled for 2.0.42 and later
      versions.  We consider this release to be the best version of Apache
      available and encourage users of all prior versions to upgrade.</p>
   
  -<p>Apache 2.0.46 is available for download from</p>
  +<p>Apache 2.0.47 is available for download from</p>
   <dl>
     <dd><a href="http://httpd.apache.org/download.cgi">http://httpd.apache.org/download.cgi</a></dd>
   </dl>
  @@ -83,168 +76,60 @@
      will be using are thread-safe.  Please contact the vendors of these
      modules to obtain this information.</p>
   
  -<h2>Apache 2.0.46 Major changes</h2>
  +<h2>Apache 2.0.47 Major changes</h2>
   
  -<h3>Security vulnerabilities closed since Apache 2.0.45</h3>
  +<h3>Security vulnerabilities closed since Apache 2.0.46</h3>
   <ul>
  -    <li><code>SECURITY [CAN-2003-0245]:</code> Fixed a bug that could
be triggered
  -       remotely through mod_dav and possibly other mechanisms, causing
  -       an Apache child process to crash.  The crash was first reported
  -       by David Endler &lt;DEndler@iDefense.com&gt; and was researched and
  -       fixed by Joe Orton &lt;jorton@redhat.com&gt;.  Details will be released
  -       on 30 May 2003.</li>
  -
  -    <li><code>SECURITY [CAN-2003-0189]:</code> Fixed a denial-of-service
vulnerability
  -       affecting basic authentication on Unix platforms related to
  -       thread-safety in <code>apr_password_validate()</code>.  The problem
was reported
  -       by John Hughes &lt;john.hughes@entegrity.com&gt;</li>
  +
  +    <li>SECURITY [CAN-2003-0192]: Fixed a bug whereby certain sequences
  +        of per-directory renegotiations and the SSLCipherSuite directive
  +        being used to upgrade from a weak ciphersuite to a strong one
  +        could result in the weak ciphersuite being used in place of the
  +        strong one.  [Ben Laurie]</li>
  +
  +    <li>SECURITY [CAN-2003-0253]: Fixed a bug in prefork MPM causing
  +        temporary denial of service when accept() on a rarely accessed port
  +        returns certain errors.  Reported by Saheed Akhtar
  +        &lt;S.Akhtar@talis.com&gt;.  [Jeff Trawick]</li>
  +
  +    <li>SECURITY [CAN-2003-0254]: Fixed a bug in ftp proxy causing denial
  +        of service when target host is IPv6 but proxy server can't create
  +        IPv6 socket.  Fixed by the reporter.  [Yoshioka Tsuneo
  +        &lt;tsuneo.yoshioka@f-secure.com&gt;]</li>
  +
  +    <li>SECURITY [VU#379828] Prevent the server from crashing when entering
  +        infinite loops. The new LimitInternalRecursion directive configures
  +        limits of subsequent internal redirects and nested subrequests, after
  +        which the request will be aborted.  PR 19753 (and probably others).
  +        [William Rowe, Jeff Trawick, Andr&eacute; Malo]</li>
  +
   </ul>
   
  -<h3>Bugs fixed and features added since Apache 2.0.45</h3>
  +<h3>Bugs fixed and features added since Apache 2.0.46</h3>
   <ul>
   
  -    <li>Fix for mod_dav.  Call the 'can_be_activity' callback, if provided,
  -       when a MKACTIVITY request comes in.
  -       [Ben Collins-Sussman &lt;sussman@collab.net&gt;]</li>
  -
  -    <li>Perform run-time query in apxs for apr and apr-util's includes.
  -       [Justin Erenkrantz] </li>
  -
  -    <li>run libtool from the apr install directory (in case that is different
  -       from the apache install directory) [Jeff Trawick]</li>
  -
  -    <li>configure.in: Play nice with libtool-1.5. [Wilfredo Sanchez]</li>
  -
  -    <li>If mod_mime_magic does not know the content-type, do not attempt to
  -       guess.  PR 16908.  [Andrew Gapon &lt;agapon@telcordia.com&gt;]</li>
  -
  -    <li>ssl session caching(shmht) : Fix a SEGV problem with SHMHT session
  -       caching. PR 17864.
  -       [Andreas Leimbacher &lt;andreasl67@yahoo.de&gt;, Madhusudan Mathihalli]</li>
  -
  -    <li>Add a delete flag to htpasswd.
  -       [Thom May]</li>
  -
  -    <li>Fix mod_rewrite's handling of absolute URIs. The escaping routines
  -       now work scheme dependent and the query string will only be
  -       appended if supported by the particular scheme.  [Andr&eacute; Malo]</li>
  -
  -    <li>Add another check for already compressed content in mod_deflate.
  -       PR 19913. [Tsuyoshi SASAMOTO &lt;nazonazo@super.win.ne.jp&gt;]</li>
  -
  -    <li>Fixes for VPATH builds; copying special.mk and any future .mk files 
  -       from the source tree as well as the build tree (now creates a usable
  -       configuration for apxs), and eliminated redundant -I'nclude paths.
  -       [William Rowe]</li>
  -
  -    <li>Code fixes, constness corrections and ssl_toolkit_compat.h updates
  -       for SSLC and OpenSSL toolkit compatibility.  Still work remains to
  -       be done to cripple features based on the limitations of RSA's binary 
  -       distribution of their SSL-C toolkit.
  -       [William Rowe, Madhusudan Mathihalli, Jeff Trawick]</li>
  -
  -    <li>Linux 2.4+: If Apache is started as root and you code 
  -       CoreDumpDirectory, coredumps are enabled via the prctl() syscall.
  -       [Greg Ames]</li>
  -
  -    <li>ap_get_mime_headers_core: allocate space for the trailing null
  -       when folding is in effect.
  -       PR 18170 [Peter Mayne &lt;PeterMayne@SPAM_SUX.ap.spherion.com&gt;]</li>
  -
  -    <li>Fix --enable-mods-shared=most and other variants.  [Aaron Bannert]</li>
  -
  -    <li>mod_log_config: Add the ability to log the id of the thread 
  -       processing the request via new %P formats.  [Jeff Trawick]</li>
  -
  -    <li>Use appropriate language codes for Czech (cs) and Traditional Chinese
  -       (zh-tw) in default config files. PR 9427.  [Andr&eacute; Malo]</li>
  -
  -    <li>mod_auth_ldap: Use generic whitespace character class when parsing
  -       "require" directives, instead of literal spaces only. PR 17135.
  -       [Andr&eacute; Malo]</li>
  -
  -    <li>Hook mod_rewrite's type checker before mod_mime's one. That way the
  -       RewriteRule [T=...] Flag should work as expected now. PR 19626.
  -       [Andr&eacute; Malo]</li>
  -
  -    <li>htpasswd: Check the processed file on validity. If a line is not empty
  -       and not a comment, it must contain at least one colon. Otherwise exit
  -       with error code 7. [Kris Verbeeck &lt;Kris.Verbeeck@ubizen.com&gt;, Thom
May]</li>
  -
  -    <li>Fix a problem that caused httpd to be linked with incorrect flags
  -       on some platforms when mod_so was enabled by default, breaking 
  -       DSOs on AIX.  PR 19012  [Jeff Trawick]</li>
  -
  -    <li>By default, use the same CC and CPP with which APR was built.
  -       The user can override with CC and CPP environment variables.
  -       [Jeff Trawick]</li>
  -
  -    <li>Fix ap_construct_url() so that it surrounds IPv6 literal address
  -       strings with [].  This fixes certain types of redirection.
  -       PR 19207.  [Jeff Trawick]</li>
  -
  -    <li>forward port of buffer overflow fixes for htdigest. [Thom May]</li>
  -
  -    <li>Added AllowEncodedSlashes directive to permit control of whether
  -       the server will accept encoded slashes ('%2f') in the URI path.
  -       Default condition is off (the historical behaviour).  This permits
  -       environments in which the path-info needs to contain encoded
  -       slashes.  PR 543, 2389, 3581, 3589, 5687, 7066, 7865, 14639.
  -       [Ken Coar]</li>
  -
  -    <li>When using Redirect in directory context, append requested query
  -       string if there's no one supplied by configuration. PR 10961.
  -       [Andr&eacute; Malo]</li>
  -
  -    <li>Unescape the supplied wildcard pattern in mod_autoindex. Otherwise
  -       the pattern will not always match as desired. PR 12596.
  -       [Andr&eacute; Malo]</li>
  -
  -    <li>mod_autoindex now emits and accepts modern query string parameter
  -       delimiters (;). Thus column headers no longer contain unescaped
  -       ampersands. PR 10880  [Andr&eacute; Malo]</li>
  -
  -    <li>Enable ap_sock_disable_nagle for Windows. This along with the 
  -       addition of APR_TCP_NODELAY_INHERITED to apr.hw will cause Nagle 
  -       to be disabled for Windows. [Allan Edwards]</li>
  -
  -    <li>Correct a mis-correlation between mpm_common.c and mpm_common.h;
  -       This patch reverts us to pre-2.0.46 behavior, using the 
  -       ap_sock_disable_nagle noop macro, because ap_sock_disable_nagle 
  -       was never compiled on Win32. [Allan Edwards, William Rowe]</li>
  -
  -    <li>Fix a build problem with passing unsupported --enable-layout
  -       args to apr and apr-util.  This broke binbuild.sh as well as
  -       user-specified layout parameters.  PR 18649 [Justin Erenkrantz,
  -       Jeff Trawick]</li>
  -
  -    <li>If a Date response header was already set in the headers array,
  -       this value was ignored in favour of the current time. This meant
  -       that Date headers on proxied requests where rewritten when they
  -       should not have been. PR: 14376 [Graham Leggett]</li>
  -
  -    <li>Add code to buildconf that produces an httpd.spec file from
  -       httpd.spec.in, using build/get-version.sh from APR.
  -       [Graham Leggett]</li>
  -
  -    <li>Fixed a segfault when multiple ProxyBlock directives were used.
  -       PR: 19023 [Sami Tikka &lt;sami.tikka@f-secure.com&gt;]</li>
  -
  -    <li><code>SECURITY [CAN-2003-0134]</code> OS2: Fix a Denial of Service
vulnerability 
  -       identified and reported by Robert Howard &lt;rihoward@rawbw.com&gt; that

  -       where device names faulted the running OS2 worker process.
  -       The fix is actually in APR 0.9.4.  [Brian Havard]</li>
  -
  -    <li>Forward port: Escape special characters (especially control
  -       characters) in mod_log_config to make a clear distinction between
  -       client-supplied strings (with special characters) and server-side
  -       strings. This was already introduced in version 1.3.25.
  -       [Andr&eacute; Malo]</li>
  -
  -    <li>mod_deflate: Check also err_headers_out for an already set
  -       Content-Encoding: gzip header. This prevents gzip compressed content
  -       from a CGI script from being compressed once more. PR 17797.
  -       [Andr&eacute; Malo]</li>
  +    <li>core_output_filter: don't split the brigade after a FLUSH bucket if
  +        it's the last bucket.  This prevents creating unneccessary empty
  +        brigades which may not be destroyed until the end of a keepalive
  +        connection.
  +        [Juan Rivera &lt;Juan.Rivera@citrix.com&gt;]</li>
  +
  +    <li>Add support for "streamy" PROPFIND responses.
  +        [Ben Collins-Sussman &lt;sussman@collab.net&gt;]</li>
  +
  +    <li>mod_cgid: Eliminate a double-close of a socket.  This resolves
  +        various operational problems in a threaded MPM, since on the
  +        second attempt to close the socket, the same descriptor was
  +        often already in use by another thread for another purpose.
  +        [Jeff Trawick]</li>
  +
  +    <li>mod_negotiation: Introduce "prefer-language" environment variable,
  +        which allows to influence the negotiation process on request basis
  +        to prefer a certain language.  [Andr&eacute; Malo]</li>
  +
  +    <li>Make mod_expires' ExpiresByType work properly, including for
  +        dynamically-generated documents.  [Ken Coar, Bill Stoddard]</li>
  +
   </ul>
   
   </body>
  
  
  
  1.34      +67 -185   httpd-dist/Announcement2.txt
  
  Index: Announcement2.txt
  ===================================================================
  RCS file: /home/cvs/httpd-dist/Announcement2.txt,v
  retrieving revision 1.33
  retrieving revision 1.34
  diff -u -r1.33 -r1.34
  --- Announcement2.txt	28 May 2003 05:47:23 -0000	1.33
  +++ Announcement2.txt	9 Jul 2003 11:11:11 -0000	1.34
  @@ -1,51 +1,44 @@
   
  -                       Apache 2.0.46 Released
  +                       Apache 2.0.47 Released
   
      The Apache Software Foundation and the Apache HTTP Server Project are
  -   pleased to announce the ninth public release of the Apache 2.0
  +   pleased to announce the tenth public release of the Apache 2.0
      HTTP Server.  This Announcement notes the significant changes in
  -   2.0.46 as compared to 2.0.45.
  +   2.0.47 as compared to 2.0.46.
   
   
      This version of Apache is principally a security and bug fix release.
      A summary of the bug fixes is given at the end of this document.
  -   Of particular note is that 2.0.46 addresses two security
  +   Of particular note is that 2.0.47 addresses four security
      vulnerabilities:
   
  -   Apache 2.0 versions 2.0.37 through 2.0.45 can be caused to crash in
  -   certain circumstances.  This can be triggered remotely through mod_dav
  -   and possibly other mechanisms.  The crash was originally reported by
  -   David Endler <DEndler@iDefense.com> and was researched and fixed by
  -   Joe Orton <jorton@redhat.com>.  Specific details and an analysis of the
  -   crash will be published Friday, May 30.  No more specific information
  -   is disclosed at this time, but all Apache 2.0 users are encouraged to
  -   upgrade now.
  -   [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245]
  -  
  -   Apache 2.0 versions 2.0.40 through 2.0.45 on Unix platforms were
  -   vulnerable to a denial-of-service attack on the basic authentication
  -   module, which was reported by John Hughes <john.hughes@entegrity.com>.
  -   A bug in the configuration scripts caused the apr_password_validate()
  -   function to be thread-unsafe on platforms with crypt_r(), including
  -   AIX and Linux.  All versions of Apache 2.0 have this thread-safety
  -   problem on platforms with no crypt_r() and no thread-safe crypt(),
  -   such as Mac OS X and possibly others.  When using a threaded MPM (which
  -   is not the default on these platforms), this allows remote attackers
  -   to create a denial of service which causes valid usernames and
  -   passwords for Basic Authentication to fail until Apache is restarted.
  -   We do not believe this bug could allow unauthorized users to gain
  -   access to protected resources.
  -   [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0189]
  +   Certain sequences of per-directory renegotiations and the SSLCipherSuite
  +   directive being used to upgrade from a weak ciphersuite to a strong one
  +   could result in the weak ciphersuite being used in place of the strong
  +   one.
  +   [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0192]
  +
  +   Certain errors returned by accept() on rarely accessed ports could cause
  +   temporal denial of service, due to a bug in the prefork MPM.
  +   [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253]
  +
  +   Denial of service was caused when target host is IPv6 but ftp proxy
  +   server can't create IPv6 socket.
  +   [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254]
  +
  +   The server would crash when going into an infinite loop due to too many
  +   subsequent internal redirects and nested subrequests.
  +   [VU#379828]
   
  -   The Apache Software Foundation would like to thank David Endler
  -   and John Hughes for the responsible reporting of these issues.
  +   The Apache Software Foundation would like to thank Saheed Akhtar and
  +   Yoshioka Tsuneo for the responsible reporting of two of these issues.
   
   
      This release is compatible with modules compiled for 2.0.42 and later
      versions.  We consider this release to be the best version of Apache
      available and encourage users of all prior versions to upgrade.
   
  -   Apache 2.0.46 is available for download from
  +   Apache 2.0.47 is available for download from
   
        http://httpd.apache.org/download.cgi
   
  @@ -67,165 +60,54 @@
      modules to obtain this information.
   
   
  -                       Apache 2.0.46 Major changes
  +                       Apache 2.0.47 Major changes
   
  -   Security vulnerabilities closed since Apache 2.0.45
  +   Security vulnerabilities closed since Apache 2.0.46
   
  -    *) SECURITY [CAN-2003-0245]: Fixed a bug that could be triggered
  -       remotely through mod_dav and possibly other mechanisms, causing
  -       an Apache child process to crash.  The crash was first reported
  -       by David Endler <DEndler@iDefense.com> and was researched and
  -       fixed by Joe Orton <jorton@redhat.com>.  Details will be released
  -       on 30 May 2003.
  +    *) SECURITY [CAN-2003-0192]: Fixed a bug whereby certain sequences
  +       of per-directory renegotiations and the SSLCipherSuite directive
  +       being used to upgrade from a weak ciphersuite to a strong one
  +       could result in the weak ciphersuite being used in place of the
  +       strong one.  [Ben Laurie]
  +
  +    *) SECURITY [CAN-2003-0253]: Fixed a bug in prefork MPM causing
  +       temporary denial of service when accept() on a rarely accessed port
  +       returns certain errors.  Reported by Saheed Akhtar
  +       <S.Akhtar@talis.com>.  [Jeff Trawick]
  +
  +    *) SECURITY [CAN-2003-0254]: Fixed a bug in ftp proxy causing denial
  +       of service when target host is IPv6 but proxy server can't create
  +       IPv6 socket.  Fixed by the reporter.  [Yoshioka Tsuneo
  +       <tsuneo.yoshioka@f-secure.com>]
  +
  +    *) SECURITY [VU#379828] Prevent the server from crashing when entering
  +       infinite loops. The new LimitInternalRecursion directive configures
  +       limits of subsequent internal redirects and nested subrequests, after
  +       which the request will be aborted.  PR 19753 (and probably others).
  +       [William Rowe, Jeff Trawick, André Malo]
  +
  +
  +   Bugs fixed and features added since Apache 2.0.46
  +
  +    *) core_output_filter: don't split the brigade after a FLUSH bucket if
  +       it's the last bucket.  This prevents creating unneccessary empty
  +       brigades which may not be destroyed until the end of a keepalive
  +       connection.
  +       [Juan Rivera <Juan.Rivera@citrix.com>]
   
  -    *) SECURITY [CAN-2003-0189]: Fixed a denial-of-service vulnerability
  -       affecting basic authentication on Unix platforms related to
  -       thread-safety in apr_password_validate().  The problem was reported
  -       by John Hughes <john.hughes@entegrity.com>
  -
  -
  -   Bugs fixed and features added since Apache 2.0.45
  -
  -    *) Fix for mod_dav.  Call the 'can_be_activity' callback, if provided,
  -       when a MKACTIVITY request comes in.
  +    *) Add support for "streamy" PROPFIND responses.
          [Ben Collins-Sussman <sussman@collab.net>]
   
  -    *) Perform run-time query in apxs for apr and apr-util's includes.
  -       [Justin Erenkrantz] 
  -
  -    *) run libtool from the apr install directory (in case that is different
  -       from the apache install directory) [Jeff Trawick]
  -
  -    *) configure.in: Play nice with libtool-1.5. [Wilfredo Sanchez]
  -
  -    *) If mod_mime_magic does not know the content-type, do not attempt to
  -       guess.  PR 16908.  [Andrew Gapon <agapon@telcordia.com>]
  -
  -    *) ssl session caching(shmht) : Fix a SEGV problem with SHMHT session
  -       caching. PR 17864.
  -       [Andreas Leimbacher <andreasl67@yahoo.de>, Madhusudan Mathihalli]
  -
  -    *) Add a delete flag to htpasswd.
  -       [Thom May]
  -
  -    *) Fix mod_rewrite's handling of absolute URIs. The escaping routines
  -       now work scheme dependent and the query string will only be
  -       appended if supported by the particular scheme.  [André Malo]
  -
  -    *) Add another check for already compressed content in mod_deflate.
  -       PR 19913. [Tsuyoshi SASAMOTO <nazonazo@super.win.ne.jp>]
  -
  -    *) Fixes for VPATH builds; copying special.mk and any future .mk files 
  -       from the source tree as well as the build tree (now creates a usable
  -       configuration for apxs), and eliminated redundant -I'nclude paths.
  -       [William Rowe]
  -
  -    *) Code fixes, constness corrections and ssl_toolkit_compat.h updates
  -       for SSLC and OpenSSL toolkit compatibility.  Still work remains to
  -       be done to cripple features based on the limitations of RSA's binary 
  -       distribution of their SSL-C toolkit.
  -       [William Rowe, Madhusudan Mathihalli, Jeff Trawick]
  -
  -    *) Linux 2.4+: If Apache is started as root and you code 
  -       CoreDumpDirectory, coredumps are enabled via the prctl() syscall.
  -       [Greg Ames]
  -
  -    *) ap_get_mime_headers_core: allocate space for the trailing null
  -       when folding is in effect.
  -       PR 18170 [Peter Mayne <PeterMayne@SPAM_SUX.ap.spherion.com>]
  -
  -    *) Fix --enable-mods-shared=most and other variants.  [Aaron Bannert]
  -
  -    *) mod_log_config: Add the ability to log the id of the thread 
  -       processing the request via new %P formats.  [Jeff Trawick]
  -
  -    *) Use appropriate language codes for Czech (cs) and Traditional Chinese
  -       (zh-tw) in default config files. PR 9427.  [André Malo]
  -
  -    *) mod_auth_ldap: Use generic whitespace character class when parsing
  -       "require" directives, instead of literal spaces only. PR 17135.
  -       [André Malo]
  -
  -    *) Hook mod_rewrite's type checker before mod_mime's one. That way the
  -       RewriteRule [T=...] Flag should work as expected now. PR 19626.
  -       [André Malo]
  -
  -    *) htpasswd: Check the processed file on validity. If a line is not empty
  -       and not a comment, it must contain at least one colon. Otherwise exit
  -       with error code 7. [Kris Verbeeck <Kris.Verbeeck@ubizen.com>, Thom May]
  -
  -    *) Fix a problem that caused httpd to be linked with incorrect flags
  -       on some platforms when mod_so was enabled by default, breaking 
  -       DSOs on AIX.  PR 19012  [Jeff Trawick]
  -
  -    *) By default, use the same CC and CPP with which APR was built.
  -       The user can override with CC and CPP environment variables.
  +    *) mod_cgid: Eliminate a double-close of a socket.  This resolves
  +       various operational problems in a threaded MPM, since on the
  +       second attempt to close the socket, the same descriptor was
  +       often already in use by another thread for another purpose.
          [Jeff Trawick]
   
  -    *) Fix ap_construct_url() so that it surrounds IPv6 literal address
  -       strings with [].  This fixes certain types of redirection.
  -       PR 19207.  [Jeff Trawick]
  -
  -    *) forward port of buffer overflow fixes for htdigest. [Thom May]
  -
  -    *) Added AllowEncodedSlashes directive to permit control of whether
  -       the server will accept encoded slashes ('%2f') in the URI path.
  -       Default condition is off (the historical behaviour).  This permits
  -       environments in which the path-info needs to contain encoded
  -       slashes.  PR 543, 2389, 3581, 3589, 5687, 7066, 7865, 14639.
  -       [Ken Coar]
  -
  -    *) When using Redirect in directory context, append requested query
  -       string if there's no one supplied by configuration. PR 10961.
  -       [André Malo]
  -
  -    *) Unescape the supplied wildcard pattern in mod_autoindex. Otherwise
  -       the pattern will not always match as desired. PR 12596.
  -       [André Malo]
  -
  -    *) mod_autoindex now emits and accepts modern query string parameter
  -       delimiters (;). Thus column headers no longer contain unescaped
  -       ampersands. PR 10880  [André Malo]
  -
  -    *) Enable ap_sock_disable_nagle for Windows. This along with the 
  -       addition of APR_TCP_NODELAY_INHERITED to apr.hw will cause Nagle 
  -       to be disabled for Windows. [Allan Edwards]
  -
  -    *) Correct a mis-correlation between mpm_common.c and mpm_common.h;
  -       This patch reverts us to pre-2.0.46 behavior, using the 
  -       ap_sock_disable_nagle noop macro, because ap_sock_disable_nagle 
  -       was never compiled on Win32. [Allan Edwards, William Rowe]
  -
  -    *) Fix a build problem with passing unsupported --enable-layout
  -       args to apr and apr-util.  This broke binbuild.sh as well as
  -       user-specified layout parameters.  PR 18649 [Justin Erenkrantz,
  -       Jeff Trawick]
  -
  -    *) If a Date response header was already set in the headers array,
  -       this value was ignored in favour of the current time. This meant
  -       that Date headers on proxied requests where rewritten when they
  -       should not have been. PR: 14376 [Graham Leggett]
  -
  -    *) Add code to buildconf that produces an httpd.spec file from
  -       httpd.spec.in, using build/get-version.sh from APR.
  -       [Graham Leggett]
  -
  -    *) Fixed a segfault when multiple ProxyBlock directives were used.
  -       PR: 19023 [Sami Tikka <sami.tikka@f-secure.com>]
  -
  -    *) SECURITY [CAN-2003-0134] OS2: Fix a Denial of Service vulnerability 
  -       identified and reported by Robert Howard <rihoward@rawbw.com> that 
  -       where device names faulted the running OS2 worker process.
  -       The fix is actually in APR 0.9.4.  [Brian Havard]
  -
  -    *) Forward port: Escape special characters (especially control
  -       characters) in mod_log_config to make a clear distinction between
  -       client-supplied strings (with special characters) and server-side
  -       strings. This was already introduced in version 1.3.25.
  -       [André Malo]
  -
  -    *) mod_deflate: Check also err_headers_out for an already set
  -       Content-Encoding: gzip header. This prevents gzip compressed content
  -       from a CGI script from being compressed once more. PR 17797.
  -       [André Malo]
  +    *) mod_negotiation: Introduce "prefer-language" environment variable,
  +       which allows to influence the negotiation process on request basis
  +       to prefer a certain language.  [André Malo]
  +
  +    *) Make mod_expires' ExpiresByType work properly, including for
  +       dynamically-generated documents.  [Ken Coar, Bill Stoddard]
   
  
  
  
  1.38      +5 -5      httpd-dist/README.html
  
  Index: README.html
  ===================================================================
  RCS file: /home/cvs/httpd-dist/README.html,v
  retrieving revision 1.37
  retrieving revision 1.38
  diff -u -r1.37 -r1.38
  --- README.html	1 Jun 2003 22:11:17 -0000	1.37
  +++ README.html	9 Jul 2003 11:11:11 -0000	1.38
  @@ -35,21 +35,21 @@
      <a href="http://www.apache.org/dist/httpd/KEYS">KEYS file</a>.</p>
   
   <ul>
  -<li>httpd-2.0.46.tar.gz is signed by Justin Erenkrantz <code>[E2226795]</code>
  -<li>httpd-2.0.46-win32-src.zip is signed by William Rowe <code>[10FDE075]</code>
  +<li>httpd-2.0.47.tar.gz is signed by Sander Striker <code>[DE885DD3]</code></li>
  +<li>httpd-1.3.27.tar.gz is signed by Jim Jagielski <code>[08C975E5]</code></li>
   </ul>
   
   <p>Always use the signature files to verify the authenticity
      of the distribution, <i>e.g.</i>,
      <pre>
      % pgpk -a KEYS
  -   % pgpv httpd-2.0.46.tar.gz.asc
  +   % pgpv httpd-2.0.47.tar.gz.asc
      <i>or</i>,
      % pgp -ka KEYS
  -   % pgp httpd-2.0.46.tar.gz.asc
  +   % pgp httpd-2.0.47.tar.gz.asc
      <i>or</i>,
      % gpg --import KEYS
  -   % gpg --verify httpd-2.0.46.tar.gz.asc
  +   % gpg --verify httpd-2.0.47.tar.gz.asc
      </pre></p>
   
   <p>We offer MD5 hashes as an alternative to validate the integrity
  
  
  
  1.32      +1 -1      httpd-dist/binaries/win32/HEADER.html
  
  Index: HEADER.html
  ===================================================================
  RCS file: /home/cvs/httpd-dist/binaries/win32/HEADER.html,v
  retrieving revision 1.31
  retrieving revision 1.32
  diff -u -r1.31 -r1.32
  --- HEADER.html	28 May 2003 05:47:24 -0000	1.31
  +++ HEADER.html	9 Jul 2003 11:11:12 -0000	1.32
  @@ -6,7 +6,7 @@
   <li><a href="#winsock">Windows 95 Apache Users Read This First</a></li>
   <li><a href="#xpbug">Windows XP Apache Users Read This First</a><br/></li>
   <li><a href="#zonealarm">ZoneAlarm (or other firewall) Users Read This First</a></li>
  -<li><a href="#stable" style="color:purple;">The current stable release is Apache
2.0.46</a><br/></li>
  +<li><a href="#stable" style="color:purple;">The current stable release is Apache
2.0.47</a><br/></li>
   <li><a href="#old" style="color:green;">The old stable release is Apache 1.3.27</a></li>
   <li><a href="#msi">MSI Binary Distribution Packages</a></li>
   <li><a href="TROUBLESHOOTING.html">Troubleshooting MSI Installation Problems</a></li>
  
  
  
  1.39      +2 -2      httpd-dist/binaries/win32/README.html
  
  Index: README.html
  ===================================================================
  RCS file: /home/cvs/httpd-dist/binaries/win32/README.html,v
  retrieving revision 1.38
  retrieving revision 1.39
  diff -u -r1.38 -r1.39
  --- README.html	28 May 2003 05:47:24 -0000	1.38
  +++ README.html	9 Jul 2003 11:11:12 -0000	1.39
  @@ -82,11 +82,11 @@
      responsibility to determine the compatibility between any firewall product
      and the Apache HTTP Server.</p>
   
  -<h2><a name="stable">The current stable release is Apache 2.0.46</a></h2>
  +<h2><a name="stable">The current stable release is Apache 2.0.47</a></h2>
   
   <p>Apache 2.0 is released for General Availability.</p>
   
  -<p>The Apache HTTP Server Project is proud to present the ninth public release
  +<p>The Apache HTTP Server Project is proud to present the tenth public release
      of Apache 2.0.  Apache 2.0 has been running on the Apache.org website 
      since December of 2000 and has proven to be very reliable.</p>
   
  
  
  
  1.6       +1 -1      httpd-dist/tools/release.sh
  
  Index: release.sh
  ===================================================================
  RCS file: /home/cvs/httpd-dist/tools/release.sh,v
  retrieving revision 1.5
  retrieving revision 1.6
  diff -u -r1.5 -r1.6
  --- release.sh	28 May 2003 09:16:53 -0000	1.5
  +++ release.sh	9 Jul 2003 11:11:12 -0000	1.6
  @@ -139,7 +139,7 @@
     for p in `find ${dirname}-patches -type f -name '*.patch'`
     do
       ( cd $dirname &&
  -      cat ../$p | patch -p0
  +      cat ../$p | patch -p0 --no-backup-if-mismatch
       ) || exit 1
     done
     
  
  
  

Mime
View raw message