You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by mj...@apache.org on 2005/10/19 10:02:45 UTC
svn commit: r326446 - /httpd/httpd/branches/1.3.x/src/CHANGES
Author: mjc
Date: Wed Oct 19 01:02:41 2005
New Revision: 326446
URL: http://svn.apache.org/viewcvs?rev=326446&view=rev
Log:
Today a one-time change happens to all CAN- names as they are
renamed to CVE-. Make this change to our changelog.
Modified:
httpd/httpd/branches/1.3.x/src/CHANGES
Modified: httpd/httpd/branches/1.3.x/src/CHANGES
URL: http://svn.apache.org/viewcvs/httpd/httpd/branches/1.3.x/src/CHANGES?rev=326446&r1=326445&r2=326446&view=diff
==============================================================================
--- httpd/httpd/branches/1.3.x/src/CHANGES (original)
+++ httpd/httpd/branches/1.3.x/src/CHANGES Wed Oct 19 01:02:41 2005
@@ -28,7 +28,7 @@
Changes with Apache 1.3.33
- *) SECURITY: CAN-2004-0940 (cve.mitre.org)
+ *) SECURITY: CVE-2004-0940 (cve.mitre.org)
mod_include: Fix potential buffer overflow with escaped characters
in SSI tag string. [Martin Kraemer, Jim Jagielski]
@@ -71,7 +71,7 @@
*) Win32: Improve error reporting after a failed attempt to spawn a
piped log process or rewrite map process. [Jeff Trawick]
- *) SECURITY: CAN-2004-0492 (cve.mitre.org)
+ *) SECURITY: CVE-2004-0492 (cve.mitre.org)
Reject responses from a remote server if sent an invalid (negative)
Content-Length. [Mark Cox]
@@ -94,7 +94,7 @@
Changes with Apache 1.3.31
- *) SECURITY: CAN-2003-0987 (cve.mitre.org)
+ *) SECURITY: CVE-2003-0987 (cve.mitre.org)
Verification as to whether the nonce returned in the client response
is one we issued ourselves by means of a AuthDigestRealmSeed secret
exposed as an md5(). See mod_digest documentation for more details.
@@ -112,7 +112,7 @@
connections when invalid IPs are accessed. PR 27542.
[Alexander Prohorenko <white extrasy.net>]
- *) SECURITY: CAN-2004-0174 (cve.mitre.org)
+ *) SECURITY: CVE-2004-0174 (cve.mitre.org)
Fix starvation issue on listening sockets where a short-lived
connection on a rarely-accessed listening socket will cause a
child to hold the accept mutex and block out new connections until
@@ -191,7 +191,7 @@
Changes with Apache 1.3.29
- *) SECURITY: CAN-2003-0542 (cve.mitre.org)
+ *) SECURITY: CVE-2003-0542 (cve.mitre.org)
Fix buffer overflows in mod_alias and mod_rewrite which occurred if
one configured a regular expression with more than 9 captures.
[André Malo]
@@ -233,7 +233,7 @@
Changes with Apache 1.3.28
- *) SECURITY: CAN-2003-0460 (cve.mitre.org)
+ *) SECURITY: CVE-2003-0460 (cve.mitre.org)
Fix the rotatelogs support program on Win32 and OS/2 to ignore
special control characters received over the pipe. Previously
such characters could cause rotatelogs to quit logging and exit.
@@ -432,7 +432,7 @@
UseCanonicalName is set to Off and a server is being run at
a domain that allows wildcard DNS. [Matthew Murphy]
- *) SECURITY: CAN-2002-0843 (cve.mitre.org)
+ *) SECURITY: CVE-2002-0843 (cve.mitre.org)
Fix some possible overflows in ab.c that could be exploited by
a malicious server. Reported by David Wagner. [Jim Jagielski]
@@ -451,7 +451,7 @@
cruft. This patch allows us to tailor/control this properly by
allowing simple wildcards such as *.conf. [Dirk-Willem van Gulik]
- *) SECURITY: CAN-2002-0839 (cve.mitre.org)
+ *) SECURITY: CVE-2002-0839 (cve.mitre.org)
Add the new directive 'ShmemUIDisUser'. By default, Apache
will no longer set the uid/gid of SysV shared memory scoreboard
to User/Group, and it will therefore stay the uid/gid of
@@ -573,7 +573,7 @@
Netscape-4.x Roaming Profiles (on a DAV-enabled server)
[Martin Kraemer]
- *) SECURITY: CAN-2003-0083 (cve.mitre.org)
+ *) SECURITY: CVE-2003-0083 (cve.mitre.org)
Disallow anything but whitespace on the request line after the
HTTP/x.y protocol string. That prevents arbitrary user input
from ending up in the access_log and error_log. Also, special
@@ -1066,7 +1066,7 @@
*) PORT: Some Cygwin changes, esp. improvements for dynamic loading,
and cleanups. [Stipe Tolj <tolj wapme-systems.de>]
- *) Win32 SECURITY: CAN-2001-0729 (cve.mitre.org)
+ *) Win32 SECURITY: CVE-2001-0729 (cve.mitre.org)
The default installation could lead to mod_negotiation
and mod_dir/mod_autoindex displaying a directory listing instead of
the index.html.* files, if a very long path was created artificially
@@ -1369,7 +1369,7 @@
*) Apache on Win9x now ensures the service is stopped before removal.
[William Rowe]
- *) SECURITY: CAN-2001-0925 (cve.mitre.org)
+ *) SECURITY: CVE-2001-0925 (cve.mitre.org)
The default installation could lead to mod_negotiation
and mod_dir/mod_autoindex displaying a directory listing instead of
the index.html.* files, if a very long path was created artificially
@@ -1759,7 +1759,7 @@
for modules and executables dynamically linked to the core.
[William Rowe; Jim Patterson <jim-patterson ncf.ca>]
- *) SECURITY: CAN-2000-1204 (cve.mitre.org)
+ *) SECURITY: CVE-2000-1204 (cve.mitre.org)
Prevent the source code for CGIs from being revealed when
using mod_vhost_alias and the CGI directory is under the document root
and a user makes a request like http://www.example.com//cgi-bin/cgi
@@ -2055,11 +2055,11 @@
the given character set on any document that does not have one
explicitly specified in the headers. [Marc Slemko, Jim Jagielski]
- *) SECURITY: CAN-2000-1205 (cve.mitre.org)
+ *) SECURITY: CVE-2000-1205 (cve.mitre.org)
Properly escape various messages output to the client from a number
of modules and places in the core code. [Marc Slemko]
- *) SECURITY: CAN-2000-1205 (cve.mitre.org)
+ *) SECURITY: CVE-2000-1205 (cve.mitre.org)
Change mod_actions, mod_autoindex, mod_expires, and mod_log_config to
not consider any parameters such as charset when making decisions
based on content type. This does remove some functionality for
@@ -2069,7 +2069,7 @@
want to set things on a per charset basis is necessary in the future.
[Marc Slemko]
- *) SECURITY: CAN-2000-1205 (cve.mitre.org)
+ *) SECURITY: CVE-2000-1205 (cve.mitre.org)
mod_include now entity encodes output from "printenv" and "echo var"
by default. The encoding for "echo var" can be set to URL encoding
or no encoding using the new "encoding" attribute to the echo tag.
@@ -2128,7 +2128,7 @@
*) Add back support for UseCanonicalName in <Directory> containers
[Manoj Kasichainula]
- *) SECURITY: CAN-2000-1206 (cve.mitre.org)
+ *) SECURITY: CVE-2000-1206 (cve.mitre.org)
More rigorous checking of Host: headers to fix security
problems with mass name-based virtual hosting (whether using mod_rewrite
or mod_vhost_alias).