You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by ji...@apache.org on 2014/07/15 19:27:19 UTC
svn commit: r5859 - in /dev/httpd: Announcement2.4.html Announcement2.4.txt
Author: jim
Date: Tue Jul 15 17:27:19 2014
New Revision: 5859
Log:
draft of announcements
Modified:
dev/httpd/Announcement2.4.html
dev/httpd/Announcement2.4.txt
Modified: dev/httpd/Announcement2.4.html
==============================================================================
--- dev/httpd/Announcement2.4.html (original)
+++ dev/httpd/Announcement2.4.html Tue Jul 15 17:27:19 2014
@@ -15,12 +15,12 @@
<img src="../../images/apache_sub.gif" alt="" />
<h1>
- Apache HTTP Server 2.4.9 Released
+ Apache HTTP Server 2.4.10 Released
</h1>
<p>
The Apache Software Foundation and the Apache HTTP Server Project are
pleased to <a href="http://www.apache.org/dist/httpd/Announcement2.4.html">announce</a>
- the release of version 2.4.9 of the Apache
+ the release of version 2.4.10 of the Apache
HTTP Server ("Apache"). This version of Apache is our latest GA
release of the new generation 2.4.x branch of Apache HTTPD and
represents fifteen years of
@@ -29,16 +29,33 @@
and bug fix release.
</p>
<ul>
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098">CVE-2014-0098</a>
- Segfaults with truncated cookie logging.
- mod_log_config: Prevent segfaults when logging truncated
- cookies. Clean up the cookie logging parser to recognize
- only the cookie=value pairs, not valueless cookies.
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117">CVE-2014-0117</a>
+ mod_proxy: Fix crash in Connection header handling which
+ allowed a denial of service attack against a reverse proxy
+ with a threaded MPM.
</li>
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438">CVE-2013-6438</a>
- mod_dav: Keep track of length of cdata properly when removing
- leading spaces. Eliminates a potential denial of service from
- specifically crafted DAV WRITE requests
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3523">CVE-2014-3523</a>
+ Fix a memory consumption denial of service in the WinNT MPM (used in all Windows
+ installations). Workaround: AcceptFilter <protocol> {none|connect}
+</li>
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226">CVE-2014-0226</a>
+ Fix a race condition in scoreboard handling, which could lead to
+ a heap buffer overflow.
+</li>
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118">CVE-2014-0118</a>
+ mod_deflate: The DEFLATE input filter (inflates request bodies) now
+ limits the length and compression ratio of inflated request bodies to avoid
+ denial of sevice via highly compressed bodies. See directives
+ DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
+ and DeflateInflateRatioBurst.
+</li>
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231">CVE-2014-0231</a>
+ mod_cgid: Fix a denial of service against CGI scripts that do
+ not consume stdin that could lead to lingering HTTPD child processes
+ filling up the scoreboard and eventually hanging the server. By
+ default, the client I/O timeout (Timeout directive) now applies to
+ communication with scripts. The CGIDScriptTimeout directive can be
+ used to set a different timeout for communication with scripts.
</li>
</ul>
<p>
@@ -54,11 +71,10 @@
</ul>
<p>
We consider this release to be the best version of Apache available, and
- encourage users of all prior versions to upgrade. [NOTE: 2.4.8 was not
- released.]
+ encourage users of all prior versions to upgrade.
</p>
<p>
- Apache HTTP Server 2.4.9 is available for download from:
+ Apache HTTP Server 2.4.10 is available for download from:
</p>
<dl>
<dd><a href="http://httpd.apache.org/download.cgi"
@@ -66,7 +82,7 @@
</dl>
<p>
Please see the CHANGES_2.4 file, linked from the download page, for a
- full list of changes. A condensed list, CHANGES_2.4.9 includes only
+ full list of changes. A condensed list, CHANGES_2.4.10 includes only
those changes introduced since the prior 2.4 release. A summary of all
of the security vulnerabilities addressed in this and earlier releases
is available:
Modified: dev/httpd/Announcement2.4.txt
==============================================================================
--- dev/httpd/Announcement2.4.txt (original)
+++ dev/httpd/Announcement2.4.txt Tue Jul 15 17:27:19 2014
@@ -1,23 +1,40 @@
- Apache HTTP Server 2.4.9 Released
+ Apache HTTP Server 2.4.10 Released
The Apache Software Foundation and the Apache HTTP Server Project
- are pleased to announce the release of version 2.4.9 of the Apache
+ are pleased to announce the release of version 2.4.10 of the Apache
HTTP Server ("Apache"). This version of Apache is our latest GA
release of the new generation 2.4.x branch of Apache HTTPD and
represents fifteen years of innovation by the project, and is
recommended over all previous releases. This release of Apache is
principally a security, feature and bug fix release.
- CVE-2014-0098 (cve.mitre.org)
- Segfaults with truncated cookie logging.
- mod_log_config: Prevent segfaults when logging truncated
- cookies. Clean up the cookie logging parser to recognize
- only the cookie=value pairs, not valueless cookies.
-
- CVE-2013-6438 (cve.mitre.org)
- mod_dav: Keep track of length of cdata properly when removing
- leading spaces. Eliminates a potential denial of service from
- specifically crafted DAV WRITE requests
+ CVE-2014-0117 (cve.mitre.org)
+ mod_proxy: Fix crash in Connection header handling which
+ allowed a denial of service attack against a reverse proxy
+ with a threaded MPM.
+
+ CVE-2014-3523 (cve.mitre.org)
+ Fix a memory consumption denial of service in the WinNT MPM (used in all Windows
+ installations). Workaround: AcceptFilter <protocol> {none|connect}
+
+ CVE-2014-0226 (cve.mitre.org)
+ Fix a race condition in scoreboard handling, which could lead to
+ a heap buffer overflow.
+
+ CVE-2014-0118 (cve.mitre.org)
+ mod_deflate: The DEFLATE input filter (inflates request bodies) now
+ limits the length and compression ratio of inflated request bodies to avoid
+ denial of sevice via highly compressed bodies. See directives
+ DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
+ and DeflateInflateRatioBurst.
+
+ CVE-2014-0231 (cve.mitre.org)
+ mod_cgid: Fix a denial of service against CGI scripts that do
+ not consume stdin that could lead to lingering HTTPD child processes
+ filling up the scoreboard and eventually hanging the server. By
+ default, the client I/O timeout (Timeout directive) now applies to
+ communication with scripts. The CGIDScriptTimeout directive can be
+ used to set a different timeout for communication with scripts.
Also in this release are some exciting new features including:
@@ -29,10 +46,9 @@
DirectoryMatch, FilesMatch and ProxyMatch directives.
We consider this release to be the best version of Apache available, and
- encourage users of all prior versions to upgrade. [NOTE: 2.4.8 was not
- released.]
+ encourage users of all prior versions to upgrade.
- Apache HTTP Server 2.4.9 is available for download from:
+ Apache HTTP Server 2.4.10 is available for download from:
http://httpd.apache.org/download.cgi
@@ -43,7 +59,7 @@
http://httpd.apache.org/docs/trunk/new_features_2_4.html
Please see the CHANGES_2.4 file, linked from the download page, for a
- full list of changes. A condensed list, CHANGES_2.4.9 includes only
+ full list of changes. A condensed list, CHANGES_2.4.10 includes only
those changes introduced since the prior 2.4 release. A summary of all
of the security vulnerabilities addressed in this and earlier releases
is available: