ced453d1c3
Major changes since 1.3.28: Security vulnerabilities * CAN-2003-0542 (cve.mitre.org) Fix buffer overflows in mod_alias and mod_rewrite which occurred if one configured a regular expression with more than 9 captures. Bugs fixed The following noteworthy bugs were found in Apache 1.3.28 (or earlier) and have been fixed in Apache 1.3.29: * Within ap_bclose(), ap_pclosesocket() is now called * consistently for sockets and ap_pclosef() for files. Also, closesocket() is used consistenly to close socket fd's. The previous confusion between socket and file fd's would cause problems with some applications now that we proactively close fd's to prevent leakage. * Fixed mod_usertrack to not get false positive matches on the user-tracking cookie's name. * Prevent creation of subprocess Zombies when using CGI wrappers such as suEXEC and cgiwrap.
17 lines
946 B
Text
17 lines
946 B
Text
$NetBSD: distinfo,v 1.18 2003/11/02 09:35:12 cube Exp $
|
|
|
|
SHA1 (apache_1.3.29.tar.gz) = 0fb055dfd8c86457996edb36f19fb66f09dccd6a
|
|
Size (apache_1.3.29.tar.gz) = 2435809 bytes
|
|
SHA1 (sitedrivenby.gif) = 7671e9a8ec2cad3961b268befd33c0920e07c658
|
|
Size (sitedrivenby.gif) = 8519 bytes
|
|
SHA1 (apache-1.3.29-v6-20031028.diff.gz) = 13ceac2dfce9d66f3089667f1ec5e1ec30961621
|
|
Size (apache-1.3.29-v6-20031028.diff.gz) = 36988 bytes
|
|
SHA1 (patch-aa) = 6388498d251bb4bde65954803ff0b0bce21b27f8
|
|
SHA1 (patch-ab) = 7619dbf1cf584f9e92998fe25de0860bfbeb277e
|
|
SHA1 (patch-ac) = d4dd4f5521a7c713a038dec2606dad14356d746f
|
|
SHA1 (patch-ae) = 2e4e7aab1cff7ddc82697946eeb8d13cd3aa1df0
|
|
SHA1 (patch-af) = 8115ea5b59fc86e7354effd25dc22525e7627802
|
|
SHA1 (patch-ah) = 553f8f2bf4bf7278adb46ff8749be154f10e39d3
|
|
SHA1 (patch-ai) = 46d9a97fbc248a2bea97943b9f3b2f9f693f3695
|
|
SHA1 (patch-aj) = 1cdd2f010d381ec9c13f59b31caab7d1f6f63100
|
|
SHA1 (patch-ak) = 8f790a692ed9b2dd6943be43fa1cf7629c673955
|