- Apache 1.3.27 Released
+ Apache 1.3.28 Released
The Apache Software Foundation and The Apache Server Project are
- pleased to announce the release of version 1.3.27 of the Apache HTTP
- Server. This Announcement notes the significant changes in 1.3.27
- as compared to 1.3.26.
+ pleased to announce the release of version 1.3.28 of the Apache HTTP
+ Server. This Announcement notes the significant changes in 1.3.28
+ as compared to 1.3.27.
- This version of Apache is principally a security and bug fix release.
+ This version of Apache is principally a bug and security fix release.
A summary of the bug fixes is given at the end of this document.
- Of particular note is that 1.3.27 addresses and fixes 3 security
- vulnerabilities.
-
- CAN-2002-0839 (cve.mitre.org): A vulnerability exists in all versions of
- Apache prior to 1.3.27 on platforms using System V shared memory based
- scoreboards. This vulnerability allows an attacker who can execute under
- the Apache UID to exploit the Apache shared memory scoreboard format and
- send a signal to any process as root or cause a local denial of service
- attack. We thank iDefense for their responsible notification and
- disclosure of this issue.
-
- CAN-2002-0840 (cve.mitre.org): Apache is susceptible to a cross site
- scripting vulnerability in the default 404 page of any web server hosted
- on a domain that allows wildcard DNS lookups. We thank Matthew Murphy for
- the responsible notification and disclosure of this issue.
+ Of particular note is that 1.3.28 addresses and fixes 3 potential
+ security issues:
+
+ o CAN-2003-0460 (cve.mitre.org): Fix the rotatelogs support program on
+ Win32 and OS/2 to ignore special control characters received over the
+ pipe. Previously such characters could cause it to quit logging and
+ exit. We would like to thank the Hitachi Incident Response team for
+ their responsible disclosure of this issue.
+
+ o VU#379828 : The server could crash when going into an infinite loop
+ due to too many subsequent internal redirects and nested subrequests.
- CAN-2002-0843 (cve.mitre.org): There were some possible overflows in ab.c
- which could be exploited by a malicious server. Note that this
- vulnerability is not in Apache itself, but rather one of the support
- programs bundled with Apache. We thank David Wagner for the responsible
- notification and disclosure of this issue.
+ o Eliminated leaks of several file descriptors to child processes, such
+ as CGI scripts.
- We consider Apache 1.3.27 to be the best version of Apache 1.3 available
+ We consider Apache 1.3.28 to be the best version of Apache 1.3 available
and we strongly recommend that users of older versions, especially of
the 1.1.x and 1.2.x family, upgrade as soon as possible. No further
releases will be made in the 1.2.x family.
- Apache 1.3.27 is available for download from
+ Apache 1.3.28 is available for download from
http://www.apache.org/dist/httpd/
Apache 2.0 for better performance, stability and security on their
platforms.
- Apache 1.3.27 Major changes
+ Apache 1.3.28 Major changes
Security vulnerabilities
- * Fix the security vulnerability noted in CAN-2002-0839 (cve.mitre.org)
- regarding ownership permissions of System V shared memory based
- scoreboards. The fix resulted in the new ShmemUIDisUser directive.
-
- * Fix the security vulnerability noted in CAN-2002-0840 (cvs.mitre.org)
- regarding a cross-site scripting vulnerability in the default error
- page when using wildcard DNS.
+ * CAN-2003-0460 (cve.mitre.org): Fix the rotatelogs support program on
+ Win32 and OS/2 to ignore special control characters received over the
+ pipe. Previously such characters could cause it to quit logging and
+ exit. We would like to thank the Hitachi Incident Response team for
+ their responsible disclosure of this issue.
- * Fix the security vulnerability noted in CAN-2002-0843 (cve.mitre.org)
- regarding some possible overflows in ab.c which could be exploited by
- a malicious server.
+ * VU#379828 : The server could crash when going into an infinite loop
+ due to too many subsequent internal redirects and nested subrequests.
+
+ * Eliminated leaks of several file descriptors to child processes, such
+ as CGI scripts.
New features
- The main new features in 1.3.27 (compared to 1.3.26) are:
-
- * The new ErrorHeader directive has been added.
-
- * Configuration file globbing can now use simple pattern
- matching.
-
- * The protocol version (eg: HTTP/1.1) in the request line parsing
- is now case insensitive.
-
- * ap_snprintf() can now distinguish between an output which was
- truncated, and an output which exactly filled the buffer.
-
- * Add ProtocolReqCheck directive, which determines if Apache will
- check for a valid protocol string in the request (eg: HTTP/1.1)
- and return HTTP_BAD_REQUEST if not valid. Versions of Apache
- prior to 1.3.26 would silently ignore bad protocol strings, but
- 1.3.26 included a more strict check. This makes it runtime
- configurable.
+ The main new features in 1.3.28 (compared to 1.3.27) are:
- * Added support for Berkeley-DB/4.x to mod_auth_db.
+ * Added new ap_register_cleanup_ex() API function which allows
+ for a "magic" cleanup function to be run at register time
+ rather than at cleanup time.
- * httpd -V will now also print out the compile time defined
- HARD_SERVER_LIMIT value.
+ * Improvements to mod_usertrack that allows for a regular (verbose)
+ as well as "compact" version of the tracking cookie (the new
+ 'CookieFormat' directive), and the ability to prepend a string
+ to the cookie via the 'CookiePrefix' directive.
New features that relate to specific platforms:
- * Support Caldera OpenUNIX 8.
-
- * Use SysV semaphores by default on OpenBSD.
+ * Introduce Win32 .pdb diagnostic symbols into the Apache 1.3 build
+ (as created in Apache 2.0.45 and later.) which akes debugging and
+ analysis of crash dumps and Dr. Watson logs trivial.
- * Implemented file locking in mod_rewrite for the NetWare
- CLib platform.
+ * AIX: Change the default accept mechanism from pthread back to
+ fcntl.
Bugs fixed
- The following bugs were found in Apache 1.3.26 (or earlier) and have
- been fixed in Apache 1.3.27:
+ The following noteworthy bugs were found in Apache 1.3.27 (or earlier)
+ and have been fixed in Apache 1.3.28:
- * mod_proxy fixes:
- - The cache in mod_proxy was incorrectly updating the Content-Length
- value from 304 responses when doing validation.
- - Fix a problem in proxy where headers from other modules were
- added to the response headers when this was already done in the
- core already.
+ * Make sure the accept mutex is released before calling child exit
+ hooks and cleanups.
- * In 1.3.26, a null or all blank Content-Length field would be
- triggered as an error; previous versions would silently ignore
- this and assume 0. 1.3.27 restores this previous behavior.
+ * Fix mod_rewrite's handling of absolute URIs. The escaping routines
+ now work scheme dependent and the query string will only be
+ appended if supported by the particular scheme.
- * Win32: Fix one byte buffer overflow in ap_get_win32_interpreter
- when a CGI script's #! line does not contain a \r or \n (i.e.
- a line feed character) in the first 1023 bytes. The overflow
- is always a '\0' (string termination) character.
+ * Prevent obscenely large values of precision in ap_vformatter
+ from clobbering a buffer.
+ * Update timeout algorithm in free_proc_chain. If a subprocess
+ did not exit immediately, the thread would sleep for 3 seconds
+ before checking the subprocess exit status again. In a very
+ common case when the subprocess was an HTTP server CGI script,
+ the CGI script actually exited a fraction of a second into the 3
+ second sleep, which effectively limited the server to serving one
+ CGI request every 3 seconds across a persistent connection.
\ No newline at end of file