577d336e5d
- Fix permissions on installed .h files - ok'ed snj@, wiz@ - Thanks to epg@ for final check This version of Apache is principally a bug fix release. Of particular note is that 2.0.51 addresses five security vulnerabilities: An input validation issue in IPv6 literal address parsing which can result in a negative length parameter being passed to memcpy. [CAN-2004-0786] A buffer overflow in configuration file parsing could allow a local user to gain the privileges of a httpd child if the server can be forced to parse a carefully crafted .htaccess file. [CAN-2004-0747] A segfault in mod_ssl which can be triggered by a malicious remote server, if proxying to SSL servers has been configured. [CAN-2004-0751] A potential infinite loop in mod_ssl which could be triggered given particular timing of a connection abort. [CAN-2004-0748] A segfault in mod_dav_fs which can be remotely triggered by an indirect lock refresh request. [CAN-2004-0809] For further details, see http://www.apache.org/dist/httpd/Announcement2.html and http://apache.rmplc.co.uk/httpd/CHANGES_2.0.
8 lines
408 B
Text
8 lines
408 B
Text
$NetBSD: distinfo,v 1.9 2004/09/20 17:13:06 adrianp Exp $
|
|
|
|
SHA1 (httpd-2.0.51.tar.gz) = 68ce1da942226c0a6276c9c313d21fe794a95222
|
|
Size (httpd-2.0.51.tar.gz) = 6735558 bytes
|
|
SHA1 (patch-an) = 64006f0f1b5c3f20df6f47624e56aac0d99ae056
|
|
SHA1 (patch-ao) = 25d44b0028772535da908895444d2bfe56f44120
|
|
SHA1 (patch-ap) = 357776c7208407936e09891ae87d23b112a12756
|
|
SHA1 (patch-aq) = 6cc1fb879fb5d9280f543ebe068a441e2e6560f3
|