You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by wr...@apache.org on 2014/09/02 06:57:15 UTC

svn commit: r6340 - /dev/httpd/ /release/httpd/

Author: wrowe
Date: Tue Sep  2 04:57:15 2014
New Revision: 6340

Log:
Quit waiting for 0.9.8zb deltas, fix windows shortly, move unix to get it done

Added:
    release/httpd/CHANGES_2.2.29
      - copied unchanged from r6339, dev/httpd/CHANGES_2.2.29
    release/httpd/httpd-2.2.29.tar.bz2
      - copied unchanged from r6339, dev/httpd/httpd-2.2.29.tar.bz2
    release/httpd/httpd-2.2.29.tar.bz2.asc
      - copied unchanged from r6339, dev/httpd/httpd-2.2.29.tar.bz2.asc
    release/httpd/httpd-2.2.29.tar.bz2.md5
      - copied unchanged from r6339, dev/httpd/httpd-2.2.29.tar.bz2.md5
    release/httpd/httpd-2.2.29.tar.bz2.sha1
      - copied unchanged from r6339, dev/httpd/httpd-2.2.29.tar.bz2.sha1
    release/httpd/httpd-2.2.29.tar.gz
      - copied unchanged from r6339, dev/httpd/httpd-2.2.29.tar.gz
    release/httpd/httpd-2.2.29.tar.gz.asc
      - copied unchanged from r6339, dev/httpd/httpd-2.2.29.tar.gz.asc
    release/httpd/httpd-2.2.29.tar.gz.md5
      - copied unchanged from r6339, dev/httpd/httpd-2.2.29.tar.gz.md5
    release/httpd/httpd-2.2.29.tar.gz.sha1
      - copied unchanged from r6339, dev/httpd/httpd-2.2.29.tar.gz.sha1
Removed:
    dev/httpd/CHANGES_2.2.29
    dev/httpd/httpd-2.2.29.tar.bz2
    dev/httpd/httpd-2.2.29.tar.bz2.asc
    dev/httpd/httpd-2.2.29.tar.bz2.md5
    dev/httpd/httpd-2.2.29.tar.bz2.sha1
    dev/httpd/httpd-2.2.29.tar.gz
    dev/httpd/httpd-2.2.29.tar.gz.asc
    dev/httpd/httpd-2.2.29.tar.gz.md5
    dev/httpd/httpd-2.2.29.tar.gz.sha1
    release/httpd/CHANGES_2.2.27
Modified:
    release/httpd/Announcement2.2.html
    release/httpd/Announcement2.2.txt
    release/httpd/CHANGES_2.2

Modified: release/httpd/Announcement2.2.html
==============================================================================
--- release/httpd/Announcement2.2.html (original)
+++ release/httpd/Announcement2.2.html Tue Sep  2 04:57:15 2014
@@ -15,39 +15,54 @@
 <img src="../../images/apache_sub.gif" alt="" />
 
 <h1>
-                       Apache HTTP Server 2.2.27 Released
+                       Apache HTTP Server 2.2.29 Released
 </h1>
 <p>
    The Apache Software Foundation and the Apache HTTP Server Project are
-   pleased to announce the release of version 2.2.27 of the Apache HTTP
-   Server ("Apache").  This version of Apache is principally a security
-   and bug fix maintenance release.
+   pleased to announce the release of version 2.2.29 of the Apache HTTP
+   Server ("Apache"). (Note that 2.2.28 was not released). This version
+   of Apache is principally a security and bug fix maintenance release,
+   and addresses these specific security defects as well as other fixes;
 </p>
 <ul>
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098">CVE-2014-0098</a>
-     Segfaults with truncated cookie logging.
-     mod_log_config: Prevent segfaults when logging truncated
-     cookies. Clean up the cookie logging parser to recognize
-     only the cookie=value pairs, not valueless cookies.
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118">CVE-2014-0118</a>
+     mod_deflate: The DEFLATE input filter (inflates request bodies) now
+     limits the length and compression ratio of inflated request bodies to
+     avoid denial of sevice via highly compressed bodies. See directives
+     DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
+     and DeflateInflateRatioBurst.
 </li>
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438">CVE-2013-6438</a>
-     mod_dav: Keep track of length of cdata properly when removing
-     leading spaces. Eliminates a potential denial of service from
-     specifically crafted DAV WRITE requests
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231">CVE-2014-0231</a>
+     mod_cgid: Fix a denial of service against CGI scripts that do
+     not consume stdin that could lead to lingering HTTPD child processes
+     filling up the scoreboard and eventually hanging the server. By
+     default, the client I/O timeout (Timeout directive) now applies to
+     communication with scripts. The CGIDScriptTimeout directive can be
+     used to set a different timeout for communication with scripts.
+</li>
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226">CVE-2014-0226</a>
+     Fix a race condition in scoreboard handling, which could lead to
+     a heap buffer overflow.
+</li>
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704">CVE-2013-5704</a>
+     HTTP trailers could be used to replace HTTP headers late during
+     request processing, potentially undoing or otherwise confusing
+     modules that examined or modified request headers earlier.
+     Adds "MergeTrailers" directive to restore this legacy behavior. 
 </li>
 </ul>
 <p>
    We consider the Apache HTTP Server 2.4 release to be the best version
    of Apache available, and encourage users of 2.2 and all prior versions
-   to upgrade.  This 2.2 maintenance release is offered for those unable
-   to upgrade at this time.  For further details, see:
+   to upgrade. This 2.2 maintenance release is offered for those unable
+   to upgrade at this time. For further details, see:
 <dl>
   <dd><a href="http://www.apache.org/dist/httpd/Announcement2.4.html"
               >http://www.apache.org/dist/httpd/Announcement2.4.html</a></dd>
 </dl>
 </p>
 <p>
-   Apache HTTP Server 2.4 and 2.2.27 are available for download from:
+   Apache HTTP Server 2.4 and 2.2.29 are available for download from:
 </p>
 <dl>
   <dd><a href="http://httpd.apache.org/download.cgi"
@@ -55,8 +70,8 @@
 </dl>
 <p>
    Please see the CHANGES_2.2 file, linked from the download page, for a
-   full list of changes.  A condensed list, CHANGES_2.2.27 includes only
-   those changes introduced since the prior 2.2 release.  A summary of all 
+   full list of changes. A condensed list, CHANGES_2.2.29 includes only
+   those changes introduced since the prior 2.2 release. A summary of all 
    of the security vulnerabilities addressed in this and earlier releases 
    is available:
 </p>
@@ -66,9 +81,9 @@
   </dd>
 </dl>
 <p>
-   This release includes the Apache Portable Runtime (APR) version 1.5.0
+   This release includes the Apache Portable Runtime (APR) version 1.5.1
    and APR Utility Library (APR-util) version 1.5.3, bundled with the tar
-   and zip distributions.  The APR libraries libapr and libaprutil (and
+   and zip distributions. The APR libraries libapr and libaprutil (and
    on Win32, libapriconv version 1.2.1) must all be updated to ensure
    binary compatibility and address many known security and platform bugs.
    APR version 1.5 and APR-util version 1.5 represent minor version upgrades
@@ -76,7 +91,7 @@
 </p>
 <p>
    This release builds on and extends the Apache 2.0 API and is superceeded
-   by the Apache 2.4 API.  Modules written for Apache 2.0 or 2.4 will need
+   by the Apache 2.4 API. Modules written for Apache 2.0 or 2.4 will need
    to be recompiled in order to run with Apache 2.2, and most will require
    minimal or no source code changes.
 </p>

Modified: release/httpd/Announcement2.2.txt
==============================================================================
--- release/httpd/Announcement2.2.txt (original)
+++ release/httpd/Announcement2.2.txt Tue Sep  2 04:57:15 2014
@@ -1,50 +1,65 @@
-                       Apache HTTP Server 2.2.27 Released
+                       Apache HTTP Server 2.2.29 Released
 
    The Apache Software Foundation and the Apache HTTP Server Project are
-   pleased to announce the release of version 2.2.27 of the Apache HTTP
-   Server ("Apache").  This version of Apache is principally a security
-   and bug fix maintenance release.
-
-   CVE-2014-0098 (cve.mitre.org)
-     Segfaults with truncated cookie logging.
-     mod_log_config: Prevent segfaults when logging truncated
-     cookies. Clean up the cookie logging parser to recognize
-     only the cookie=value pairs, not valueless cookies.
-
-   CVE-2013-6438 (cve.mitre.org)
-     mod_dav: Keep track of length of cdata properly when removing
-     leading spaces. Eliminates a potential denial of service from
-     specifically crafted DAV WRITE requests
+   pleased to announce the release of version 2.2.29 of the Apache HTTP
+   Server ("Apache"). (Note that 2.2.28 was not released). This version
+   of Apache is principally a security and bug fix maintenance release,
+   and addresses these specific security defects as well as other fixes;
+
+    CVE-2014-0118 (cve.mitre.org)
+     mod_deflate: The DEFLATE input filter (inflates request bodies) now
+     limits the length and compression ratio of inflated request bodies to
+     avoid denial of sevice via highly compressed bodies. See directives
+     DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
+     and DeflateInflateRatioBurst.
+
+    CVE-2014-0231 (cve.mitre.org)
+     mod_cgid: Fix a denial of service against CGI scripts that do
+     not consume stdin that could lead to lingering HTTPD child processes
+     filling up the scoreboard and eventually hanging the server. By
+     default, the client I/O timeout (Timeout directive) now applies to
+     communication with scripts. The CGIDScriptTimeout directive can be
+     used to set a different timeout for communication with scripts.
+
+    CVE-2014-0226 (cve.mitre.org)
+     Fix a race condition in scoreboard handling, which could lead to
+     a heap buffer overflow.
+
+    CVE-2013-5704 (cve.mitre.org)
+     HTTP trailers could be used to replace HTTP headers late during
+     request processing, potentially undoing or otherwise confusing
+     modules that examined or modified request headers earlier.
+     Adds "MergeTrailers" directive to restore this legacy behavior. 
 
    We consider the Apache HTTP Server 2.4 release to be the best version
    of Apache available, and encourage users of 2.2 and all prior versions
-   to upgrade.  This 2.2 maintenance release is offered for those unable
-   to upgrade at this time.  For further details, see:
+   to upgrade. This 2.2 maintenance release is offered for those unable
+   to upgrade at this time. For further details, see:
 
      http://www.apache.org/dist/httpd/Announcement2.4.txt
 
-   Apache HTTP Server 2.4 and 2.2.27 are available for download from:
+   Apache HTTP Server 2.4 and 2.2.29 are available for download from:
 
      http://httpd.apache.org/download.cgi
 
    Please see the CHANGES_2.2 file, linked from the download page, for a
-   full list of changes.  A condensed list, CHANGES_2.2.27 includes only
-   those changes introduced since the prior 2.2 release.  A summary of all 
+   full list of changes. A condensed list, CHANGES_2.2.29 includes only
+   those changes introduced since the prior 2.2 release. A summary of all 
    of the security vulnerabilities addressed in this and earlier releases 
    is available:
 
      http://httpd.apache.org/security/vulnerabilities_22.html
 
-   This release includes the Apache Portable Runtime (APR) version 1.5.0
+   This release includes the Apache Portable Runtime (APR) version 1.5.1
    and APR Utility Library (APR-util) version 1.5.3, bundled with the tar
-   and zip distributions.  The APR libraries libapr and libaprutil (and
+   and zip distributions. The APR libraries libapr and libaprutil (and
    on Win32, libapriconv version 1.2.1) must all be updated to ensure
    binary compatibility and address many known security and platform bugs.
    APR version 1.5 and APR-util version 1.5 represent minor version upgrades
    from earlier httpd 2.2 source distributions.
 
    This release builds on and extends the Apache 2.0 API and is superceeded
-   by the Apache 2.4 API.  Modules written for Apache 2.0 or 2.4 will need
+   by the Apache 2.4 API. Modules written for Apache 2.0 or 2.4 will need
    to be recompiled in order to run with Apache 2.2, and most will require
    minimal or no source code changes.
 

Modified: release/httpd/CHANGES_2.2
==============================================================================
--- release/httpd/CHANGES_2.2 (original)
+++ release/httpd/CHANGES_2.2 Tue Sep  2 04:57:15 2014
@@ -1,4 +1,80 @@
                                                          -*- coding: utf-8 -*-
+Changes with Apache 2.2.29
+
+  *) Corrected docs/manual pages for new MergeTrailers directive and other
+     out of date documentation. [William Rowe]
+
+Changes with Apache 2.2.28
+
+  *) SECURITY: CVE-2014-0118 (cve.mitre.org)
+     mod_deflate: The DEFLATE input filter (inflates request bodies) now
+     limits the length and compression ratio of inflated request bodies to avoid
+     denial of service via highly compressed bodies.  See directives
+     DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
+     and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
+
+  *) SECURITY: CVE-2014-0231 (cve.mitre.org)
+     mod_cgid: Fix a denial of service against CGI scripts that do
+     not consume stdin that could lead to lingering HTTPD child processes
+     filling up the scoreboard and eventually hanging the server.  By
+     default, the client I/O timeout (Timeout directive) now applies to
+     communication with scripts.  The CGIDScriptTimeout directive can be
+     used to set a different timeout for communication with scripts.
+     [Rainer Jung, Eric Covener, Yann Ylavic]
+
+  *) SECURITY: CVE-2014-0226 (cve.mitre.org)
+     Fix a race condition in scoreboard handling, which could lead to
+     a heap buffer overflow.  [Joe Orton, Eric Covener, Jeff Trawick]
+ 
+  *) SECURITY: CVE-2013-5704 (cve.mitre.org)
+     core: HTTP trailers could be used to replace HTTP headers
+     late during request processing, potentially undoing or
+     otherwise confusing modules that examined or modified
+     request headers earlier.  Adds "MergeTrailers" directive to restore
+     legacy behavior.  [Edward Lu, Yann Ylavic, Joe Orton, Eric Covener]
+
+  *) core: Detect incomplete request and response bodies, log an error and
+     forward it to the underlying filters. PR 55475.  [Yann Ylavic]
+
+  *) mod_deflate: Handle Zlib header and validation bytes received in multiple
+     chunks. PR 46146. [Yann Ylavic]
+
+  *) mod_proxy: Don't reuse a SSL backend connection whose requested SNI
+     differs. PR 55782.  [Yann Ylavic]
+ 
+  *) mod_deflate: Fix inflation of files larger than 4GB. PR 56062.
+     [Lukas Bezdicka <social v3.sk>]
+
+  *) mod_dav: Fix improper encoding in PROPFIND responses.  PR 56480.
+     [Ben Reser]
+
+  *) mod_ssl: Extend the scope of SSLSessionCacheTimeout to sessions
+     resumed by TLS session resumption (RFC 5077). [Rainer Jung]
+
+  *) mod_proxy_ajp: Forward local IP address as a custom request attribute
+     like we already do for the remote port. [Rainer Jung]
+
+  *) mod_deflate: Don't fail when flushing inflated data to the user-agent
+     and that coincides with the end of stream ("Zlib error flushing inflate
+     buffer"). PR 56196. [Christoph Fausak <christoph fausak glueckkanja.com>]
+
+  *) mod_cache, mod_disk_cache: With CacheLock enabled, responses with a Vary 
+     header might not get the benefit of the thundering herd protection due to 
+     an incorrect internal cache key.  PR 50317. 
+     [Ruediger Pluem, Jan Kaluza, Yann Ylavic]
+
+  *) mod_rewrite: Support session cookies with the CO= flag when later
+     parameters are used.  The doc for this implied the feature had been
+     backported for quite some time.  PR56014 [Eric Covener]
+
+  *) mod_cache: Don't remove stale cache entries that cannot be conditionally
+     revalidated. This prevents the thundering herd protection from serving
+     stale responses during a revalidation. PR 50317.
+     [Eric Covener, Jan Kaluza,  Ruediger Pluem]
+
+  *) core: Increase TCP_DEFER_ACCEPT socket option to from 1 to 30 seconds. 
+     PR 41270. [Dean Gaudet <dean arctic org>]
+
 Changes with Apache 2.2.27
 
   *) SECURITY: CVE-2014-0098 (cve.mitre.org)
@@ -572,7 +648,6 @@ Changes with Apache 2.2.16
   *) mod_rewrite: Allow to set environment variables without explicitly
      giving a value. [Rainer Jung]
 
-
 Changes with Apache 2.2.15
 
   *) SECURITY: CVE-2009-3555 (cve.mitre.org)