pkgsrc/www/apache2/distinfo

19 lines
1,014 B
Text
Raw Normal View History

Update apache2 to 2.0.65. Changes with Apache 2.0.65 *) SECURITY: CVE-2013-1862 (cve.mitre.org) mod_rewrite: Ensure that client data written to the RewriteLog is escaped to prevent terminal escape sequences from entering the log file. [Eric Covener, Jeff Trawick, Joe Orton] *) SECURITY: CVE-2012-0053 (cve.mitre.org) Fix an issue in error responses that could expose "httpOnly" cookies when no custom ErrorDocument is specified for status code 400. [Eric Covener] *) SECURITY: CVE-2012-0031 (cve.mitre.org) Fix scoreboard issue which could allow an unprivileged child process to cause the parent to crash at shutdown rather than terminate cleanly. [Joe Orton] *) SECURITY: CVE-2011-3368 (cve.mitre.org) Reject requests where the request-URI does not match the HTTP specification, preventing unexpected expansion of target URLs in some reverse proxy configurations. [Joe Orton] *) SECURITY: CVE-2011-3192 (cve.mitre.org) core: Fix handling of byte-range requests to use less memory, to avoid denial of service. If the sum of all ranges in a request is larger than the original file, ignore the ranges and send the complete file. bug#51714. [Jeff Trawick, Stefan Fritsch, Jim Jagielski, Ruediger Pluem, Eric Covener, <lowprio20 gmail.com>] *) SECURITY: CVE-2011-3607 (cve.mitre.org) Fix integer overflow in ap_pregsub() which, when the mod_setenvif module is enabled, could allow local users to gain privileges via a .htaccess file. [Stefan Fritsch, Greg Ames] NOTE: it remains possible to exhaust all memory using a carefully crafted .htaccess rule, which will not be addressed in 2.0; enabling processing of .htaccess files authored by untrusted users is the root of such security risks. Upgrade to httpd 2.2.25 or later to limit this specific risk. *) core: Add MaxRanges directive to control the number of ranges permitted before returning the entire resource, with a default limit of 200. [Eric Covener, Rainer Jung] *) Set 'Accept-Ranges: none' in the case Ranges are being ignored with MaxRanges none. [Eric Covener, Rainer Jung] *) mod_rewrite: Allow merging RewriteBase down to subdirectories if new option 'RewriteOptions MergeBase' is configured. [Eric Covener] *) mod_rewrite: Fix the RewriteEngine directive to work within a location. Previously, once RewriteEngine was switched on globally, it was impossible to switch off. [Graham Leggett] *) mod_rewrite: Add "AllowAnyURI" option. bug#52774. [Joe Orton] *) htdigest: Fix buffer overflow when reading digest password file with very long lines. bug#54893. [Rainer Jung] *) mod_ssl: Add "SSLHonorCipherOrder" directive to enable the OpenSSL 0.9.7 flag which uses the server's cipher order rather than the client's. bug#28665. [Jim Schneider <jschneid netilla.com>] *) mod_include: Prevent a case of SSI timefmt-smashing with filter chains including multiple INCLUDES filters. bug#39369 [Joe Orton] *) mod_rewrite: When evaluating a proxy rule in directory context, do escape the filename by default. bug#46428 [Joe Orton] *) Improve platform detection for bundled PCRE by updating config.guess and config.sub. [Rainer Jung] *) ssl-std.conf: Disable AECDH ciphers in example config. bug#51363. [Rob Stradling <rob comodo com>] *) ssl-std.conf: Change the SSLCipherSuite default to a shorter, whitelist oriented definition. [Rainer Jung, Kaspar Brand] *) ssl-std.conf: Only select old MSIE browsers for the downgrade in http/https behavior. [Greg Stein, Stefan Fritsch]
2013-08-04 04:45:42 +02:00
$NetBSD: distinfo,v 1.59 2013/08/04 02:45:42 obache Exp $
Update apache2 to 2.0.65. Changes with Apache 2.0.65 *) SECURITY: CVE-2013-1862 (cve.mitre.org) mod_rewrite: Ensure that client data written to the RewriteLog is escaped to prevent terminal escape sequences from entering the log file. [Eric Covener, Jeff Trawick, Joe Orton] *) SECURITY: CVE-2012-0053 (cve.mitre.org) Fix an issue in error responses that could expose "httpOnly" cookies when no custom ErrorDocument is specified for status code 400. [Eric Covener] *) SECURITY: CVE-2012-0031 (cve.mitre.org) Fix scoreboard issue which could allow an unprivileged child process to cause the parent to crash at shutdown rather than terminate cleanly. [Joe Orton] *) SECURITY: CVE-2011-3368 (cve.mitre.org) Reject requests where the request-URI does not match the HTTP specification, preventing unexpected expansion of target URLs in some reverse proxy configurations. [Joe Orton] *) SECURITY: CVE-2011-3192 (cve.mitre.org) core: Fix handling of byte-range requests to use less memory, to avoid denial of service. If the sum of all ranges in a request is larger than the original file, ignore the ranges and send the complete file. bug#51714. [Jeff Trawick, Stefan Fritsch, Jim Jagielski, Ruediger Pluem, Eric Covener, <lowprio20 gmail.com>] *) SECURITY: CVE-2011-3607 (cve.mitre.org) Fix integer overflow in ap_pregsub() which, when the mod_setenvif module is enabled, could allow local users to gain privileges via a .htaccess file. [Stefan Fritsch, Greg Ames] NOTE: it remains possible to exhaust all memory using a carefully crafted .htaccess rule, which will not be addressed in 2.0; enabling processing of .htaccess files authored by untrusted users is the root of such security risks. Upgrade to httpd 2.2.25 or later to limit this specific risk. *) core: Add MaxRanges directive to control the number of ranges permitted before returning the entire resource, with a default limit of 200. [Eric Covener, Rainer Jung] *) Set 'Accept-Ranges: none' in the case Ranges are being ignored with MaxRanges none. [Eric Covener, Rainer Jung] *) mod_rewrite: Allow merging RewriteBase down to subdirectories if new option 'RewriteOptions MergeBase' is configured. [Eric Covener] *) mod_rewrite: Fix the RewriteEngine directive to work within a location. Previously, once RewriteEngine was switched on globally, it was impossible to switch off. [Graham Leggett] *) mod_rewrite: Add "AllowAnyURI" option. bug#52774. [Joe Orton] *) htdigest: Fix buffer overflow when reading digest password file with very long lines. bug#54893. [Rainer Jung] *) mod_ssl: Add "SSLHonorCipherOrder" directive to enable the OpenSSL 0.9.7 flag which uses the server's cipher order rather than the client's. bug#28665. [Jim Schneider <jschneid netilla.com>] *) mod_include: Prevent a case of SSI timefmt-smashing with filter chains including multiple INCLUDES filters. bug#39369 [Joe Orton] *) mod_rewrite: When evaluating a proxy rule in directory context, do escape the filename by default. bug#46428 [Joe Orton] *) Improve platform detection for bundled PCRE by updating config.guess and config.sub. [Rainer Jung] *) ssl-std.conf: Disable AECDH ciphers in example config. bug#51363. [Rob Stradling <rob comodo com>] *) ssl-std.conf: Change the SSLCipherSuite default to a shorter, whitelist oriented definition. [Rainer Jung, Kaspar Brand] *) ssl-std.conf: Only select old MSIE browsers for the downgrade in http/https behavior. [Greg Stein, Stefan Fritsch]
2013-08-04 04:45:42 +02:00
SHA1 (httpd-2.0.65.tar.bz2) = 0183866df73c7877ba9275a075a2ece7a67f6c95
RMD160 (httpd-2.0.65.tar.bz2) = 1f0142a843486a53ba184ceb9214dc78f071e17e
Size (httpd-2.0.65.tar.bz2) = 4999802 bytes
Update "apache2" package to version 2.0.53. Changes since version 2.0.52: - Fix --with-apr=/usr and/or --with-apr-util=/usr. Problem report 29740. [Max Bowsher <maxb ukf.net>] - mod_proxy: Fix ProxyRemoteMatch directive. Problem report 33170. [Rici Lake <rici ricilake.net>] - mod_proxy: Respect errors reported by pre_connection hooks. [Jeff Trawick] - --with-module can now take more than one module to be statically linked: --with-module=<modtype>:<modfile>,<modtype>:<modfile>,... If the <modtype>-subdirectory doesn't exist it will be created and populated with a standard Makefile.in. [Erik Abele] - Fix the RPM spec file so that an RPM build now works. An RPM build now requires system installations of APR and APR-util. Remove some arbitrary moving around of binaries - the RPM now maps to the ASF build of httpd. [Graham Leggett] - mod_dumpio, an I/O logging/dumping module, added to the modules/expermimental subdirectory. [Jim Jagielski] - mod_auth_ldap: Handle the inconsistent way in which the MS LDAP library handles special characters. Problem report 24437. [Jess Holle] - Win32 MPM: Correct typo in debugging output. [William Rowe] - conf: Remove AddDefaultCharset from the default configuration because setting a site-wide default does more harm than good. Problem report 23421. [Roy Fielding] - Add charset to example CGI scripts. [Roy Fielding] - mod_ssl: fail quickly if SSL connection is aborted rather than making many doomed ap_pass_brigade calls. Problem report 32699. [Joe Orton] - Remove compiled-in upper limit on LimitRequestFieldSize. [Bill Stoddard] - Start keeping track of time-taken-to-process-request again for mod_status if ExtendedStatus is enabled. [Jim Jagielski] - mod_proxy: Handle client-aborted connections correctly. Problem report 32443. [Janne Hietamäki, Joe Orton] - Fix handling of files >2Gb on all platforms (or builds) where apr_off_t is larger than apr_size_t. Problem report 28898. [Joe Orton] - mod_include: Fix bug which could truncate variable expansions of N*64 characters by one byte. Problem report 32985. [Joe Orton] - Correct handling of certain bucket types in ap_save_brigade, fixing possible segfaults in mod_cgi with #include virtual. Problem report 31247. [Joe Orton] - Allow for the use of --with-module=foo:bar where the ./modules/foo directory is local only. Assumes, of course, that the required files are in ./modules/foo, but makes it easier to statically build/log "external" modules. [Jim Jagielski] - Util_ldap: Implemented the util_ldap_cache_getuserdn() API so that ldap authorization only modules have access to the util_ldap user cache without having to require ldap authentication as well. Problem report 31898. [Jari Ahonen jah progress.com, Brad Nicholes] - mod_auth_ldap: Added the directive "Requires ldap-attribute" that allows the module to only authorize a user if the attribute value specified matches the value of the user object. Problem report 31913 [Ryan Morgan <rmorgan pobox.com>] - SECURITY: CAN-2004-0942 (cve.mitre.org) Fix for memory consumption DoS in handling of MIME folded request headers. [Joe Orton] - SECURITY: CAN-2004-0885 (cve.mitre.org) mod_ssl: Fix a bug which allowed an SSLCipherSuite setting to be bypassed during an SSL renegotiation. Problem report 31505. [Hartmut Keil <Hartmut.Keil adnovum.ch>, Joe Orton] - mod_ssl: Fail at startup rather than segfault at runtime if a client cert is configured with an encrypted private key. Problem report 24030. [Joe Orton] - apxs: fix handling of -Wc/-Wl and "-o mod_foo.so". Problem report 31448 [Joe Orton] - mod_ldap: Fix format strings to use %APR_PID_T_FMT instead of %d. [Jeff Trawick] - mod_cache: CacheDisable will only disable the URLs it was meant to disable, not all caching. Problem report 31128. [Edward Rudd <eddie omegaware.com>, Paul Querna] - mod_cache: Try to correctly follow RFC 2616 13.3 on validating stale cache responses. [Justin Erenkrantz] - mod_rewrite: Handle per-location rules when r->filename is unset. Previously this would segfault or simply not match as expected, depending on the platform. [Jeff Trawick] - mod_rewrite: Fix 0 bytes write into random memory position. Problem report 31036. [André Malo] - mod_disk_cache: Do not store aborted content. Problem report 21492. [Rüdiger Plüm <r.pluem t-online.de>] - mod_disk_cache: Correctly store cached content type. Problem report 30278. [Rüdiger Plüm <r.pluem t-online.de>] - mod_ldap: prevent the possiblity of an infinite loop in the LDAP statistics display. Problem report 29216. [Graham Leggett] - mod_ldap: fix a bogus error message to tell the user which file is causing a potential problem with the LDAP shared memory cache. Problem report 31431 [Graham Leggett] - mod_disk_cache: Do not store hop-by-hop headers. [Justin Erenkrantz] - Fix the re-linking issue when purging elements from the LDAP cache Problem report 24801. [Jess Holle <jessh ptc.com>] - mod_disk_cache: Fix races in saving responses. [Justin Erenkrantz] - Fix Expires handling in mod_cache. [Justin Erenkrantz] - Alter mod_expires to run at a different filter priority to allow proper Expires storage by mod_cache. [Justin Erenkrantz]
2005-02-09 15:57:52 +01:00
SHA1 (patch-aa) = bff1ef591f5361e7169ff9005dcf86437b9dac23
Changes 2.0.64: * SECURITY: CVE-2010-1452 (cve.mitre.org) mod_dav: Fix Handling of requests without a path segment. * SECURITY: CVE-2009-1891 (cve.mitre.org) Fix a potential Denial-of-Service attack against mod_deflate or other modules, by forcing the server to consume CPU time in compressing a large file after a client disconnects. * SECURITY: CVE-2009-3095 (cve.mitre.org) mod_proxy_ftp: sanity check authn credentials. * SECURITY: CVE-2009-3094 (cve.mitre.org) mod_proxy_ftp: NULL pointer dereference on error paths. * SECURITY: CVE-2009-3555 (cve.mitre.org) mod_ssl: Comprehensive fix of the TLS renegotiation prefix injection attack when compiled against OpenSSL version 0.9.8m or later. Introduces the 'SSLInsecureRenegotiation' directive to reopen this vulnerability and offer unsafe legacy renegotiation with clients which do not yet support the new secure renegotiation protocol, RFC 5746. * SECURITY: CVE-2009-3555 (cve.mitre.org) mod_ssl: A partial fix for the TLS renegotiation prefix injection attack for OpenSSL versions prior to 0.9.8l; reject any client-initiated renegotiations. Forcibly disable keepalive for the connection if there is any buffered data readable. Any configuration which requires renegotiation for per-directory/location access control is still vulnerable, unless using openssl 0.9.8l or later. * SECURITY: CVE-2010-0434 (cve.mitre.org) Ensure each subrequest has a shallow copy of headers_in so that the parent request headers are not corrupted. Elimiates a problematic optimization in the case of no request body. * SECURITY: CVE-2008-2364 (cve.mitre.org) mod_proxy_http: Better handling of excessive interim responses from origin server to prevent potential denial of service and high memory usage. * SECURITY: CVE-2010-0425 (cve.mitre.org) mod_isapi: Do not unload an isapi .dll module until the request processing is completed, avoiding orphaned callback pointers. * SECURITY: CVE-2008-2939 (cve.mitre.org) mod_proxy_ftp: Prevent XSS attacks when using wildcards in the path of the FTP URL. Discovered by Marc Bevand of Rapid7. * Fix recursive ErrorDocument handling. * mod_ssl: Do not do overlapping memcpy. * Add Set-Cookie and Set-Cookie2 to the list of headers allowed to pass through on a 304 response. * apxs: Fix -A and -a options to ignore whitespace in httpd.conf
2010-11-01 19:03:03 +01:00
SHA1 (patch-ab) = 32c47bd5087269f530b7d52d6a1a719a50ae7260
SHA1 (patch-ac) = 7854294ae9c7fdcf7d6c9f5f2bee526952e583e3
SHA1 (patch-ad) = 088d6ff0e7a8acfe70b4f85a6ce58d42c935fd13
Changes 2.0.64: * SECURITY: CVE-2010-1452 (cve.mitre.org) mod_dav: Fix Handling of requests without a path segment. * SECURITY: CVE-2009-1891 (cve.mitre.org) Fix a potential Denial-of-Service attack against mod_deflate or other modules, by forcing the server to consume CPU time in compressing a large file after a client disconnects. * SECURITY: CVE-2009-3095 (cve.mitre.org) mod_proxy_ftp: sanity check authn credentials. * SECURITY: CVE-2009-3094 (cve.mitre.org) mod_proxy_ftp: NULL pointer dereference on error paths. * SECURITY: CVE-2009-3555 (cve.mitre.org) mod_ssl: Comprehensive fix of the TLS renegotiation prefix injection attack when compiled against OpenSSL version 0.9.8m or later. Introduces the 'SSLInsecureRenegotiation' directive to reopen this vulnerability and offer unsafe legacy renegotiation with clients which do not yet support the new secure renegotiation protocol, RFC 5746. * SECURITY: CVE-2009-3555 (cve.mitre.org) mod_ssl: A partial fix for the TLS renegotiation prefix injection attack for OpenSSL versions prior to 0.9.8l; reject any client-initiated renegotiations. Forcibly disable keepalive for the connection if there is any buffered data readable. Any configuration which requires renegotiation for per-directory/location access control is still vulnerable, unless using openssl 0.9.8l or later. * SECURITY: CVE-2010-0434 (cve.mitre.org) Ensure each subrequest has a shallow copy of headers_in so that the parent request headers are not corrupted. Elimiates a problematic optimization in the case of no request body. * SECURITY: CVE-2008-2364 (cve.mitre.org) mod_proxy_http: Better handling of excessive interim responses from origin server to prevent potential denial of service and high memory usage. * SECURITY: CVE-2010-0425 (cve.mitre.org) mod_isapi: Do not unload an isapi .dll module until the request processing is completed, avoiding orphaned callback pointers. * SECURITY: CVE-2008-2939 (cve.mitre.org) mod_proxy_ftp: Prevent XSS attacks when using wildcards in the path of the FTP URL. Discovered by Marc Bevand of Rapid7. * Fix recursive ErrorDocument handling. * mod_ssl: Do not do overlapping memcpy. * Add Set-Cookie and Set-Cookie2 to the list of headers allowed to pass through on a 304 response. * apxs: Fix -A and -a options to ignore whitespace in httpd.conf
2010-11-01 19:03:03 +01:00
SHA1 (patch-ae) = 26bea7ea9498437fa2436710849cbb00a4159442
2009-09-04 20:55:33 +02:00
SHA1 (patch-af) = 8400ae084e31026e9d8143a0246aa3e65166f380
SHA1 (patch-ag) = 78dcb023f524ef65928b529320932c9664ec0d01
Changes 2.0.64: * SECURITY: CVE-2010-1452 (cve.mitre.org) mod_dav: Fix Handling of requests without a path segment. * SECURITY: CVE-2009-1891 (cve.mitre.org) Fix a potential Denial-of-Service attack against mod_deflate or other modules, by forcing the server to consume CPU time in compressing a large file after a client disconnects. * SECURITY: CVE-2009-3095 (cve.mitre.org) mod_proxy_ftp: sanity check authn credentials. * SECURITY: CVE-2009-3094 (cve.mitre.org) mod_proxy_ftp: NULL pointer dereference on error paths. * SECURITY: CVE-2009-3555 (cve.mitre.org) mod_ssl: Comprehensive fix of the TLS renegotiation prefix injection attack when compiled against OpenSSL version 0.9.8m or later. Introduces the 'SSLInsecureRenegotiation' directive to reopen this vulnerability and offer unsafe legacy renegotiation with clients which do not yet support the new secure renegotiation protocol, RFC 5746. * SECURITY: CVE-2009-3555 (cve.mitre.org) mod_ssl: A partial fix for the TLS renegotiation prefix injection attack for OpenSSL versions prior to 0.9.8l; reject any client-initiated renegotiations. Forcibly disable keepalive for the connection if there is any buffered data readable. Any configuration which requires renegotiation for per-directory/location access control is still vulnerable, unless using openssl 0.9.8l or later. * SECURITY: CVE-2010-0434 (cve.mitre.org) Ensure each subrequest has a shallow copy of headers_in so that the parent request headers are not corrupted. Elimiates a problematic optimization in the case of no request body. * SECURITY: CVE-2008-2364 (cve.mitre.org) mod_proxy_http: Better handling of excessive interim responses from origin server to prevent potential denial of service and high memory usage. * SECURITY: CVE-2010-0425 (cve.mitre.org) mod_isapi: Do not unload an isapi .dll module until the request processing is completed, avoiding orphaned callback pointers. * SECURITY: CVE-2008-2939 (cve.mitre.org) mod_proxy_ftp: Prevent XSS attacks when using wildcards in the path of the FTP URL. Discovered by Marc Bevand of Rapid7. * Fix recursive ErrorDocument handling. * mod_ssl: Do not do overlapping memcpy. * Add Set-Cookie and Set-Cookie2 to the list of headers allowed to pass through on a 304 response. * apxs: Fix -A and -a options to ignore whitespace in httpd.conf
2010-11-01 19:03:03 +01:00
SHA1 (patch-ah) = 241e9083a82d465d2a1a5a116b11512ef1226f1a
SHA1 (patch-ai) = 4dc88c15b0525a5aabc80d5c2a0720cd260629de
upgrade to 2.0.36. (this is still a leaf package so it shouldn't affect others) Changes with Apache 2.0.36 *) Close sockets on worker MPM when doing a graceless restart. [Aaron Bannert] *) Reverted a minor optimization in mod_ssl.c that used the vhost ID as the session id context rather that a MD5 hash of that vhost ID, because it caused very long vhost id's to be unusable with mod_ssl. PR 8572. [Cliff Woolley] *) Fix the link to the description of the CoredumpDirectory directive in the server-wide document. PR 8643. [Jeff Trawick] *) Fixed SHMCB session caching. [Aaron Bannert, Cliff Woolley] *) Synced with remaining changes from mod_ssl 2.8.8-1.3.24: - Avoid SIGBUS on sparc machines with SHMCB session caches - Allow whitespace between the pipe and the name of the program in SSLLog "| /path/to/program". [Cliff Woolley] *) Introduce mod_ext_filter and mod_deflate experimental modules to the Win32 build (zlib sources must be in srclib\zlib.) [William Rowe] *) Changes to the worker MPM's queue management and thread synchronization code to reduce mutex contention [Brian Pane] *) Don't install *.in configuration files since we already install *-std.conf files. [Aaron Bannert] *) Many improvements to the threadpool MPM. [Aaron Bannert] *) Fix subreqs that are promoted via fast_redirect from having invalid frec->r structures. This would cause subtle errors later on in request processing such as seen in PR 7966. [Justin Erenkrantz] *) More efficient pool recycling logic for the worker MPM [Brian Pane] *) Modify the worker MPM to not accept() new connections until there is an available worker thread. This prevents queued connections from starving for processing time while long-running connections were hogging all the available threads. [Aaron Bannert] *) Convert the worker MPM's fdqueue from a LIFO back into a FIFO. [Aaron Bannert] *) Get basic HTTP proxy working on EBCDIC machines. [Jeff Trawick] *) Allow mod_unique_id to work on systems with no IPv4 address corresponding to their host name. [Jeff Trawick] *) Fix suexec behavior with user directories. PR 7810. [Colm <colmmacc@redbrick.dcu.ie>] *) Reject a blank UserDir directive since it is ambiguous. PR 8472. [Justin Erenkrantz] *) Make mod_mime use case-insensitive matching when examining extensions on all platforms. PR 8223. [Justin Erenkrantz] *) Add an intelligent error message should no proxy submodules be valid to handle a request. PR 8407 [Graham Leggett] *) Major improvements in concurrent processing for AB by enabling non-blocking connect()s and preventing APR from doing blocking read()s. Also implement fatal error checking for apr_recv(). [Aaron Bannert] *) Fix Win32 NTFS Junctions (symlinks). PR 8014 [William Rowe] *) Fix Win32 'short name' aliases in httpd.conf directives. PR 8009 [William Rowe] *) Fix generation of default httpd.conf when the layout paths are disjoint. PR 7979, 8227. [Justin Erenkrantz] *) Swap downgrade-1.0 and force-response-1.0 conditional checks so that downgraded responses can have force-response. PR 8357. [Justin Erenkrantz] *) Fix perchild MPM so that it can be configured with the move to the experimental directory. [Scott Lamb <slamb@slamb.org>] *) Fix perchild MPM so that it uses ap_gname2id for groups instead of ap_uname2id. [Scott Lamb <slamb@slamb.org>] *) Fix AcceptPathInfo. PR 8234 [Cliff Woolley] *) [Security] Added the APLOG_TOCLIENT flag to ap_log_rerror() to explicitly tell the server that warning messages should be sent to the client in addition to being recorded in the error log. Prior to this change, ap_log_rerror() always sent warning messages to the client. In one case, a faulty CGI script caused the server to send a warning message to the client that contained the full path to the CGI script. This could be considered a minor security exposure. [Bill Stoddard] *) mod_autoindex output when SuppressRules was specified would omit the first carriage return so the first item in the list would appear to the right of the column headings instead of underneath them. PR 8016 [David Shane Holden <dpejesh@yahoo.com>] *) Moved the call to apr_mmap_dup outside the error branch so that it would actually get called. This fixes a core dump at init everytime you use the MMapFile directive. PR 8314 [Paul J. Reder] *) Trigger an error when a LoadModule directive attempts to load a module which is built-in. This is a common error when switching from a DSO build to a static build. [Jeff Trawick] *) Change instdso.sh to use libtool --install everywhere and then clean up some stray files and symlinks that libtool leaves around on some platforms. This gets subversion building properly since it needed a re-link to be performed by libtool at install time, and the old instdso.sh logic to simply cp the DSO didn't handle that requirement. [Sander Striker] *) Allow VPATH builds to succeed when configured from an empty directory. [Thom May <thom@planetarytramp.net>] *) Fix 'control reaches end of non-void function' warning in server/log.c. [Ben Collins-Sussman <sussman@collab.net>] *) Perchild MPM is now correctly deemed as experimental and is now located in server/mpm/experimental. [Justin Erenkrantz] *) Fix segfault in mod_mem_cache when garabge collecting an expired cache entry. [Bill Stoddard] *) Introduced -E startup_logfile_name option to httpd to allow admins to begin logging errors immediately. This provides Win32 users an alternative to sending startup errors to the event viewer, and allows other daemon tool authors an alternative to logging to stderr. [William Rowe] *) Fix subreqs with non-defined Content-Types being served improperly. [Justin Erenkrantz] *) Merge in latest GNU config.guess and config.sub files. PR 7818. [Justin Erenkrantz] *) Move 100 - Continue support to the HTTP_IN filter so that filters are guaranteed to support 100 - Continue logic without any intervention. [Justin Erenkrantz] *) Add HTTP chunked input trailer support. [Justin Erenkrantz] *) Rename and export get_mime_headers as ap_get_mime_headers. [Justin Erenkrantz] *) Allow empty Host: header arguments. PR 7441. [Justin Erenkrantz] *) Properly substitute sbindir as httpd's location in apachectl. PR 7840. [Andreas Hasenack <andreas@netbank.com.br>] *) Allow Win32 shebang scripts to follow the path (or omit the .exe suffix from the shebang command), and allow ScriptInterpreterSource Registry or RegistryStrict to override shebang lines, as 1.3 did. PR 8004 [William Rowe] *) worker MPM: Fix a situation where a child exited without releasing the accept mutex. Depending on the OS and mutex mechanism this could result in a hang. [Jeff Trawick] *) Update the instructions for how to get started with mod_example. [Stas Bekman] *) Fix PidFile to default to rel_runtimedir instead of rel_logfiledir. PR 7841. [Andreas Hasenack <andreas@netbank.com.br>] *) Win32: Fix problem that caused rapid performance degradation when number of connecting clients exceeded ThreadsPerChild. [Bill Stoddard] *) Fixed a segfault parsing large SSIs on non-mmap systems. [Brian Havard] *) Proxy was bombing out every second keepalive request, caused by a stray CRLF before the second response's status line. Proxy now tries to read one more line if it encounters a CRLF where it expected a status. PR 10010 [Graham Leggett] *) Deprecated the apr_lock.h API. Please see the following files for the improved thread and process locking and signaling: apr_proc_mutex.h, apr_thread_mutex.h, apr_thread_rwlock.h, apr_thread_cond.h, and apr_global_mutex.h. [Aaron Bannert] *) Change mod_status to use scoreboard accessor functions so it can be used in any MPM without having to be recompiled. [Ryan Morgan <rmorgan@covalent.net>] *) Fix parsing of some AP_DECLARE_DATA declarations so that the filter handle declarations are recognized. This fixes problems loading mod_autoindex on some platforms. [Brian Havard] *) add optional fixup hook to proxy [Daniel Lopez <daniel@covalent.net>] *) Remind the admin about the User and Group directives when we are unable to set permissions on a semaphore. PR 7812 [Jeff Trawick] *) fix possible compilation problem in ssl_engine_kernel.c. PR 7802 [Doug MacEachern] *) fix possible infinite loop in mod_ssl triggered by certain netscape clients [Doug MacEachern] *) fix ProxyPass when frontend is https and backend is http [Doug MacEachern] *) Add DASL support to mod_dav [Sung Kim <hunkim@cse.ucsc.edu>]
2002-06-01 15:18:01 +02:00
SHA1 (patch-ak) = f11a86b1235d5c595fa381bbb474db4fe8448215
SHA1 (patch-al) = 9af7b6c56177d971e135f0a00b3ab9ded5d1b6dd
SHA1 (patch-am) = ab4a2f7e5a1a3064e908b61157e7fd349c0b0c08
SHA1 (patch-ao) = c629a7563d0e555922526e26b266251144a14ff6