Return-Path: Delivered-To: apmail-httpd-cvs-archive@www.apache.org Received: (qmail 61342 invoked from network); 15 Sep 2004 13:25:08 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur-2.apache.org with SMTP; 15 Sep 2004 13:25:08 -0000 Received: (qmail 47880 invoked by uid 500); 15 Sep 2004 13:25:07 -0000 Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org Received: (qmail 47806 invoked by uid 500); 15 Sep 2004 13:25:06 -0000 Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list cvs@httpd.apache.org Received: (qmail 47791 invoked by uid 500); 15 Sep 2004 13:25:06 -0000 Delivered-To: apmail-httpd-dist-cvs@apache.org Received: (qmail 47788 invoked by uid 99); 15 Sep 2004 13:25:06 -0000 X-ASF-Spam-Status: No, hits=-10.0 required=10.0 tests=ALL_TRUSTED,NO_REAL_NAME X-Spam-Check-By: apache.org Received: from [209.237.227.194] (HELO minotaur.apache.org) (209.237.227.194) by apache.org (qpsmtpd/0.28) with SMTP; Wed, 15 Sep 2004 06:25:05 -0700 Received: (qmail 61263 invoked by uid 1582); 15 Sep 2004 13:25:04 -0000 Date: 15 Sep 2004 13:25:04 -0000 Message-ID: <20040915132504.61262.qmail@minotaur.apache.org> From: jorton@apache.org To: httpd-dist-cvs@apache.org Subject: cvs commit: httpd-dist Announcement2.html X-Virus-Checked: Checked X-Spam-Rating: minotaur-2.apache.org 1.6.2 0/1000/N jorton 2004/09/15 06:25:04 Modified: . Announcement2.html Log: Convert to HTML. Revision Changes Path 1.48 +38 -24 httpd-dist/Announcement2.html Index: Announcement2.html =================================================================== RCS file: /home/cvs/httpd-dist/Announcement2.html,v retrieving revision 1.47 retrieving revision 1.48 diff -d -w -u -r1.47 -r1.48 --- Announcement2.html 1 Jul 2004 16:55:41 -0000 1.47 +++ Announcement2.html 15 Sep 2004 13:25:03 -0000 1.48 @@ -14,44 +14,58 @@ > -

Apache HTTP Server 2.0.50 Released

+

Apache HTTP Server 2.0.51 Released

The Apache Software Foundation and the The Apache HTTP Server Project are - pleased to announce the release of version 2.0.50 of the Apache HTTP + pleased to announce the release of version 2.0.51 of the Apache HTTP Server ("Apache"). This Announcement notes the significant changes - in 2.0.50 as compared to 2.0.49. The Announcement is also available in - German and Japanese from:

+ in 2.0.51 as compared to 2.0.50.

-
-
http://www.apache.org/dist/httpd/Announcement2.html.de
-
http://www.apache.org/dist/httpd/Announcement2.html.ja
-
+

This version of Apache is principally a bug fix release. Of + particular note is that 2.0.51 addresses five security + vulnerabilities:

-

This version of Apache is principally a bug fix release. A summary of - the bug fixes is given at the end of this document. Of particular - note is that 2.0.50 addresses two security vulnerabilities:

+

An input validation issue in IPv6 literal address parsing which + can result in a negative length parameter being passed to memcpy.
+ [CAN-2004-0786]

-

A remotely triggered memory leak in http header parsing can allow a - denial of service attack due to excessive memory consumption.
+

A buffer overflow in configuration file parsing could allow a + local user to gain the privileges of a httpd child if the server + can be forced to parse a carefully crafted .htaccess file.
[CAN-2004-0493]

+ href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747" + >CAN-2004-0747]

+

A segfault in mod_ssl which can be triggered by a malicious + remote server, if proxying to SSL servers has been configured.
+ [CAN-2004-0751]

-

Fixes a mod_ssl buffer overflow in the FakeBasicAuth code for a - (trusted) client certificate subject DN which exceeds 6K in length.
+

A potential infinite loop in mod_ssl which could be triggered + given particular timing of a connection abort.
[CAN-2004-0488]

+ href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748" + >CAN-2004-0748]

+ +

A segfault in mod_dav_fs which can be remotely triggered by an + indirect lock refresh request.
+ [CAN-2004-0809]

+

The Apache HTTP Server Project would like to thank Codenomicon for + supplying copies of their "HTTP Test Tool" used to discover + CAN-2004-0786, and to SITIC for reporting the discovery of + CAN-2004-0747.

This release is compatible with modules compiled for 2.0.42 and later versions. We consider this release to be the best version of Apache available and encourage users of all prior versions to upgrade.

-

Apache 2.0.50 is available for download from

+

Apache 2.0.51 is available for download from

http://httpd.apache.org/download.cgi