httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From j..@apache.org
Subject cvs commit: apache-1.3 Announcement
Date Mon, 14 Jul 2003 18:49:02 GMT
jim         2003/07/14 11:49:02

  Modified:    .        Announcement
  Log:
  1st draft... 1.3.28
  
  Revision  Changes    Path
  1.87      +63 -83    apache-1.3/Announcement
  
  Index: Announcement
  ===================================================================
  RCS file: /home/cvs/apache-1.3/Announcement,v
  retrieving revision 1.86
  retrieving revision 1.87
  diff -u -r1.86 -r1.87
  --- Announcement	30 Sep 2002 16:35:20 -0000	1.86
  +++ Announcement	14 Jul 2003 18:49:02 -0000	1.87
  @@ -1,41 +1,34 @@
   
  -                            Apache 1.3.27 Released
  +                            Apache 1.3.28 Released
   
      The Apache Software Foundation and The Apache Server Project are
  -   pleased to announce the release of version 1.3.27 of the Apache HTTP
  -   Server.  This Announcement notes the significant changes in 1.3.27
  -   as compared to 1.3.26.
  +   pleased to announce the release of version 1.3.28 of the Apache HTTP
  +   Server.  This Announcement notes the significant changes in 1.3.28
  +   as compared to 1.3.27.
   
  -   This version of Apache is principally a security and bug fix release.
  +   This version of Apache is principally a bug and security fix release.
      A summary of the bug fixes is given at the end of this document.
  -   Of particular note is that 1.3.27 addresses and fixes 3 security
  -   vulnerabilities.
  +   Of particular note is that 1.3.28 addresses and fixes 3 potential
  +   security issues:
   
  -   CAN-2002-0839 (cve.mitre.org): A vulnerability exists in all versions of
  -   Apache prior to 1.3.27 on platforms using System V shared memory based
  -   scoreboards.  This vulnerability allows an attacker who can execute under
  -   the Apache UID to exploit the Apache shared memory scoreboard format and
  -   send a signal to any process as root or cause a local denial of service
  -   attack.  We thank iDefense for their responsible notification and 
  -   disclosure of this issue.
  -
  -   CAN-2002-0840 (cve.mitre.org): Apache is susceptible to a cross site
  -   scripting vulnerability in the default 404 page of any web server hosted
  -   on a domain that allows wildcard DNS lookups.  We thank Matthew Murphy for
  -   the responsible notification and disclosure of this issue.
  +    o CAN-2003-0460 (cve.mitre.org): Fix the rotatelogs support program on
  +      Win32 and OS/2 to ignore special control characters received over the
  +      pipe.  Previously such characters could cause it to quit logging and
  +      exit.  We would like to thank the Hitachi Incident Response team for
  +      their responsible disclosure of this issue.
  +
  +    o VU#379828 : The server could crash when going into an infinite loop
  +      due to too many subsequent internal redirects and nested subrequests. 
      
  -   CAN-2002-0843 (cve.mitre.org): There were some possible overflows in ab.c
  -   which could be exploited by a malicious server. Note that this
  -   vulnerability is not in Apache itself, but rather one of the support
  -   programs bundled with Apache. We thank David Wagner for the responsible
  -   notification and disclosure of this issue.
  +    o Eliminated leaks of several file descriptors to child processes, such
  +      as CGI scripts.
   
  -   We consider Apache 1.3.27 to be the best version of Apache 1.3 available
  +   We consider Apache 1.3.28 to be the best version of Apache 1.3 available
      and we strongly recommend that users of older versions, especially of
      the 1.1.x and 1.2.x family, upgrade as soon as possible.  No further
      releases will be made in the 1.2.x family.
   
  -   Apache 1.3.27 is available for download from
  +   Apache 1.3.28 is available for download from
      
          http://www.apache.org/dist/httpd/
   
  @@ -90,76 +83,63 @@
      Apache 2.0 for better performance, stability and security on their
      platforms.
   
  -                     Apache 1.3.27 Major changes
  +                     Apache 1.3.28 Major changes
   
     Security vulnerabilities
   
  -     * Fix the security vulnerability noted in CAN-2002-0839 (cve.mitre.org)
  -       regarding ownership permissions of System V shared memory based
  -       scoreboards.  The fix resulted in the new ShmemUIDisUser directive.
  -
  -     * Fix the security vulnerability noted in CAN-2002-0840 (cvs.mitre.org)
  -       regarding a cross-site scripting vulnerability in the default error
  -       page when using wildcard DNS.
  -
  -     * Fix the security vulnerability noted in CAN-2002-0843 (cve.mitre.org)
  -       regarding some possible overflows in ab.c which could be exploited by
  -       a malicious server.
  -
  -  New features
  -
  -   The main new features in 1.3.27 (compared to 1.3.26) are:
  -
  -     * The new ErrorHeader directive has been added.
  +     * CAN-2003-0460 (cve.mitre.org): Fix the rotatelogs support program on
  +       Win32 and OS/2 to ignore special control characters received over the
  +       pipe.  Previously such characters could cause it to quit logging and
  +       exit.  We would like to thank the Hitachi Incident Response team for
  +       their responsible disclosure of this issue.
   
  -     * Configuration file globbing can now use simple pattern
  -       matching.
  -
  -     * The protocol version (eg: HTTP/1.1) in the request line parsing
  -       is now case insensitive.
  -
  -     * ap_snprintf() can now distinguish between an output which was
  -       truncated, and an output which exactly filled the buffer.
  +     * VU#379828 : The server could crash when going into an infinite loop
  +       due to too many subsequent internal redirects and nested subrequests. 
  +   
  +     * Eliminated leaks of several file descriptors to child processes, such
  +       as CGI scripts.
   
  -     * Add ProtocolReqCheck directive, which determines if Apache will
  -       check for a valid protocol string in the request (eg: HTTP/1.1)
  -       and return HTTP_BAD_REQUEST if not valid. Versions of Apache
  -       prior to 1.3.26 would silently ignore bad protocol strings, but
  -       1.3.26 included a more strict check. This makes it runtime
  -       configurable.
  +  New features
   
  -     * Added support for Berkeley-DB/4.x to mod_auth_db.
  +   The main new features in 1.3.28 (compared to 1.3.27) are:
   
  -     * httpd -V will now also print out the compile time defined
  -       HARD_SERVER_LIMIT value.
  +     * Added new ap_register_cleanup_ex() API function which allows
  +       for a "magic" cleanup function to be run at register time
  +       rather than at cleanup time. 
  +
  +     * Improvements to mod_usertrack that allows for a regular (verbose)
  +       as well as "compact" version of the tracking cookie (the new
  +       'CookieFormat' directive), and the ability to prepend a string
  +       to the cookie via the 'CookiePrefix' directive.
   
      New features that relate to specific platforms:
   
  -     * Support Caldera OpenUNIX 8.
  -     
  -     * Use SysV semaphores by default on OpenBSD.
  +     * Introduce Win32 .pdb diagnostic symbols into the Apache 1.3 build
  +       (as created in Apache 2.0.45 and later.)  which akes debugging and
  +       analysis of crash dumps and Dr. Watson logs trivial.
   
  -     * Implemented file locking in mod_rewrite for the NetWare
  -       CLib platform.
  +     * AIX: Change the default accept mechanism from pthread back to
  +       fcntl.
   
     Bugs fixed
   
  -   The following bugs were found in Apache 1.3.26 (or earlier) and have
  -   been fixed in Apache 1.3.27:
  +   The following noteworthy bugs were found in Apache 1.3.27 (or earlier)
  +   and have been fixed in Apache 1.3.28:
   
  -     * mod_proxy fixes:
  -        - The cache in mod_proxy was incorrectly updating the Content-Length
  -          value from 304 responses when doing validation.
  -        - Fix a problem in proxy where headers from other modules were
  -          added to the response headers when this was already done in the
  -          core already.
  -
  -     * In 1.3.26, a null or all blank Content-Length field would be
  -       triggered as an error; previous versions would silently ignore
  -       this and assume 0.  1.3.27 restores this previous behavior.
  -
  -     * Win32: Fix one byte buffer overflow in ap_get_win32_interpreter
  -       when a CGI script's #! line does not contain a \r or \n (i.e.
  -       a line feed character) in the first 1023 bytes. The overflow
  -       is always a '\0' (string termination) character.
  +     * Make sure the accept mutex is released before calling child exit
  +       hooks and cleanups.
   
  +     * Fix mod_rewrite's handling of absolute URIs.  The escaping routines
  +       now work scheme dependent and the query string will only be
  +       appended if supported by the particular scheme.
  +
  +     * Prevent obscenely large values of precision in ap_vformatter
  +       from clobbering a buffer.
  +
  +     * Update timeout algorithm in free_proc_chain. If a subprocess
  +       did not exit immediately, the thread would sleep for 3 seconds
  +       before checking the subprocess exit status again. In a very
  +       common case when the subprocess was an HTTP server CGI script,
  +       the CGI script actually exited a fraction of a second into the 3
  +       second sleep, which effectively limited the server to serving one 
  +       CGI request every 3 seconds across a persistent connection.
  \ No newline at end of file
  
  
  

Mime
View raw message