Select your language

23 Jul 2024

Apache 2.4.62

Security release!

important: Apache HTTP Server: source code disclosure with handlers configured via AddType (CVE-2024-40725)

A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.

Users are recommended to upgrade to version 2.4.62, which fixes this issue.

Reported to security team 2024-07-09
Update 2.4.62 released 2024-07-17
Affects 2.4.60 through 2.4.61

important: Apache HTTP Server: SSRF with mod_rewrite in server/vhost context on Windows (CVE-2024-40898)

SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests.

Users are recommended to upgrade to version 2.4.62 which fixes this issue.

Acknowledgements:

  • finder: Smi1e (DBAPPSecurity Ltd.)
  • finder: xiaojunjie (DBAPPSecurity Ltd.)
Reported to security team 2024-07-12
Update 2.4.62 released 2024-07-17
Affects 2.4.0 through 2.4.61

SECURITY: CVE-2024-40898: Apache HTTP Server: SSRF with mod_rewrite in server/vhost context on Windows (cve.mitre.org) SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. Credits: Smi1e (DBAPPSecurity Ltd.)

SECURITY: CVE-2024-40725: Apache HTTP Server: source code disclosure with handlers configured via AddType (cve.mitre.org) A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.62, which fixes this issue.

mod_proxy: Fix canonicalisation and FCGI env (PATH_INFO, SCRIPT_NAME) for "balancer:" URLs set via SetHandler, also allowing for "unix:" sockets with BalancerMember(s). PR 69168. [Yann Ylavic]

mod_proxy: Avoid AH01059 parsing error for SetHandler "unix:" URLs. PR 69160 [Yann Ylavic]

mod_ssl: Fix crashes in PKCS#11 ENGINE support with OpenSSL 3.2. [Joe Orton]

mod_ssl: Add support for loading certs/keys from pkcs11: URIs via OpenSSL 3.x providers. [Ingo Franzki ifranzki linux.ibm.com]

mod_ssl: Restore SSL dumping on trace7 loglevel with OpenSSL >= 3.0. [Ruediger Pluem, Yann Ylavic]

mpm_worker: Fix possible warning (AH00045) about children processes not terminating timely. [Yann Ylavic]


12 Jul 2024

PHP 8.2.21 & 8.3.9 + xdebug hotfix


This release will enable Xdebug and develop, debug and trace modules on ALL PHP versions. In order to apply these, the PHP modules used must be re-downloaded.

PHP 8.2.21 -  https://www.php.net/ChangeLog-8.php#8.2.21

PHP 8.3.9 - https://www.php.net/ChangeLog-8.php#8.3.9

Changes xdebug to be on by default and utilizing develop, debug, & trace modes by default.

28 Jun 2024

Bearsamp 2024.6.27

Bearsampp 27 June Release

Added Xlight FTP server
Added Mailpit SMTP server
Deprecated Filezilla FTP server
Deprecated Mailhog SMTP server
Added Rebuild ini function
Completed Docblocks

26 Jun 2024

MariaDB June releases

Release Notes

This section contains the release notes for MariaDB Server releases. This section is divided into the major MariaDB series. The latest long-term stable series, as well as rolling release, is MariaDB 11.4 (maintained for five years), and the current development release is MariaDB 11.5.

    Release Notes - MariaDB 11.6 Rolling Releases

    Release Notes - MariaDB 11.5 Rolling Releases

    Release Notes - MariaDB 11.4 Series

    Release Notes - MariaDB 10.11 Series

    Other Release Notes Articles

    Content reproduced on this site is the property of its respective owners, and this content is not reviewed in advance by MariaDB. The views, information and opinions expressed by this content do not necessarily represent those of MariaDB or any other party.
    25 Jun 2024

    Ghostscript 10.03.1

    Security release!

    Fixes for CVE-2024-33869, CVE-2023-52722, CVE-2024-33870, CVE-2024-33871 and CVE-2024-29510

    News

    Recent Changes in Ghostscript

    Version 10.03.1 (2024-05-02)

    Highlights in this release include:

    • Fixes for CVE-2024-33869, CVE-2023-52722, CVE-2024-33870, CVE-2024-33871 and CVE-2024-29510

    • IMPORTANT: For the 10.04.0 release (fall/autumn 2024) we will be adding protection for device selection from PostScript input. This will mean that, by default, only the device specified on the command line will be permitted. Similar to the file permissions, there will be a "--permit-devices=" allowing a comma separation list of allowed devices. This will also take a single wildcard "*" allowing any device.

      Any application which relies on allowing PostScript to change devices during a job will have to be aware, and take action to deal with this change.

      The exception is "nulldevice", switching to that requires no special action.

    • A vulnerability was identified in the way Ghostscript/GhostPDL called tesseract for the OCR devices, which could allow arbitrary code execution. As as result, we strongly urge anyone including the OCR devices in their build to update as soon as possible.

    • As of this release (10.03.1) pdfwrite creates PDF files with XRef streams and ObjStm streams. This can result in considerably smaller PDF output files. See Vector Devices for more details.

    • Ghostscript/pdfwrite now supports passing through PDF "Optional Content".

    • Our efforts in code hygiene and maintainability continue.

    • The usual round of bug fixes, compatibility changes, and incremental improvements.

    • (9.53.0) We have added the capability to build with the Tesseract OCR engine. In such a build, new devices are available (pdfocr8/pdfocr24/pdfocr32) which render the output file to an image, OCR that image, and output the image "wrapped" up as a PDF file, with the OCR generated text information included as "invisible" text (in PDF terms, text rendering mode 3).

      Mainly due to time constraints, we only support including Tesseract from source included in our release packages, and not linking to Tesseract/Leptonica shared libraries. Whether we add this capability will be largely dependent on community demand for the feature.

      See Enabling OCR for more details.

    For a list of open issues, or to report problems, please visit bugs.ghostscript.com.

    Incompatible changes

    Included below are incompatible changes from recent releases (the specific release in question is listed in parentheses). We include these, for now, as we are aware that not everyone upgrades with every release.

    • (10.03.1) Almost all the "internal" PostScript procedures defined during the interpreter startup are now "executeonly", further reducing the attack surface of the interpreter.

      The nature of these procedures means there should be no impact for legitimate usage, but it is possible it will impact uses which abuse the previous accessibility (even for legitimate reasons). Such cases may now require "DELAYBIND", See DELAYBIND

    • (10.03.1) The "makeimagedevice" non-standard operator has been removed. It allowed low level access to the graphics library in a way that was, essentially impossible to secure.

    • (10.03.1) The "putdeviceprops", "getdeviceprops", "finddevice", "copydevice", "findprotodevice" non-standard operators have all been removed. They provided functionality that is either accessible through standard operators, or should not be used by user PostScript.

    • (10.03.1) The process of "tidying" the PostScript namespace should have removed only non-standard and undocumented operators. Nevertheless, it is possible that any integrations or utilities that rely on those non-standard and undocumented operators may stop working or may change behaviour.

      If you encounter such a case, please contact us (Discord, #ghostscript IRC channel, or the gs-devel mailing list would be best), and we'll work with you to either find an alternative solution or return the previous functionality, if there is genuinely no other option.

    • (9.55.0) Changes to the device API. This will affect developers and maintainers of Ghostscript devices. Firstly, and most importantly, the way device-specific "procs" are specified has been rewritten to make it (we think!) clearer and less confusing. See The Interface between Ghostscript and Device Drivers and The Great Device Rework Of 2021 for more details.

    • (9.55.0) The command line options -sGraphicsICCProfile=___, -dGraphicsIntent=#, -dGraphicsBlackPt=#, -dGraphicsKPreserve=# have been changed to -sVectorICCProfile=___, -dVectorIntent=#, -dVectorBlackPt=#, -dVectorKPreserve=#.

    • (9.53.0) As of 9.53.0, we have (re-)introduced the patch level to the version number, this helps facilitate a revised policy on handling security-related issues.

      Note for GSView Users: The patch level addition breaks GSView 5 (it is hardcoded to check for versions 704-999. It is possible, but not guaranteed that a GSView update might be forthcoming to resolve this.

    • (9.52) -dALLOWPSTRANSPARENCY: The transparency compositor (and related features), whilst we are improving it, remains sensitive to being driven correctly, and incorrect use can have unexpected/undefined results. Hence, as part of improving security, we limited access to these operators, originally using the -dSAFER feature. As we made "SAFER" the default mode, that became unacceptable, hence the new option -dALLOWPSTRANSPARENCY which enables access to the operators.

    • (9.50) There are a couple of subtle incompatibilities between the old and new SAFER implementations. Firstly, as mentioned in the 9.50 release notes, SAFER now leaves standard PostScript functionality unchanged (except for the file access limitations). Secondly, the interaction with save/restore operations has changed. See SAFER.

      Important Note for Windows Users:
      The file/path pattern matching is case-sensitive, even on Windows. This is a change in behaviour compared to the old code which, on Windows, was case insensitive. This is in recognition of changes in Windows behaviour, in that it now supports (although does not enforce) case sensitivity.

    Changelog

    From 9.55.0 onwards, in recognition of how unwieldy very large HTML files can become (History9.html had reached 8.1Mb!), we intend to only include the summary highlights (above).

    For anyone wanting the full details of the changes in a release, we ask them to look at the history in our public git repository: ghostpdl-10.03.1 log.

    If this change does not draw negative feedback, History?.htm file(s) will be removed from the release archives.


    Copyright © 2005-2024 Artifex Software, Inc. All rights reserved.

    This software is provided AS-IS with no warranty, either express or implied. This software is distributed under license and may not be copied, modified or distributed except as expressly authorized under the terms of that license. Refer to licensing information at https://www.artifex.com or contact Artifex Software, Inc., 39 Mesa Street, Suite 108A, San Francisco, CA 94129, USA,

    Ghostscript version 10.03.1, 02 May 2024

    17 Jun 2024

    Git 2.45.2

    Reversal of Git 2.45.1 Security Release

    17 Jun 2024

    Composer 2.7.7 Security Release

    Security release!

    This release includes fixes for issues found in a security audit by Cure53 funded by Alpha-Omega.

    • Security: Fixed command injection via malicious git branch name (GHSA-47f6-5gq3-vx9c / CVE-2024-35241)
    • Security: Fixed multiple command injections via malicious git/hg branch names (GHSA-v9qv-c7wm-wgmf / CVE-2024-35242)
    • Security: Fixed secure-http checks that could be bypassed by using malformed URL formats (fa3b958)
    • Security: Fixed Filesystem::isLocalPath including windows-specific checks on linux (3c37a67)
    • Security: Fixed perforce argument escaping (3773f77)
    • Security: Fixed handling of zip bombs when extracting archives (de5f7e3)
    • Security: Fixed Windows command parameter escaping to prevent abuse of unicode characters with best fit encoding conversion, reported by Splitline Huang (3130a74, 04a63b3)
    • Fixed PSR violations for classes not matching the namespace of a rule being hidden, this may lead to new violations being shown (#11957)
    • Fixed UX when a plugin is still in vendor dir but is not required nor allowed anymore after changing branches (#12000)
    • Fixed new platform requirements from composer.json not being checked if the lock file is outdated (#12001)
    • Fixed ability for config command to remove autoload keys (#11967)
    • Fixed empty type support in init command (#11999)
    • Fixed git clone errors when safe.bareRepository is set to strict in the git config (#11969)
    • Fixed regression showing network errors on PHP <8.1 (#11974)
    • Fixed some color bleed from a few warnings (#11972)

    17 Jun 2024

    PHP 8.1.28, 8.2.19, & 8.3.7 Release + Hotfix

    17 Jun 2024

    MySQL 8.3.0 & 8.4 Release

    09 Jun 2024

    Bearsampp 2024.6.9

    Enhancement release

    [Enhancement] added german language file
    [Enhancement] add password manager feature

    03 Jun 2024

    Bearsampp 2024.6.3 Hotfix

    Fixes issue where certain modules were missing by default in full release of Bearsampp and iconography fixes

    Fixes issue where certain modules were missing by default in full release of Bearsampp

    Updates Iconography back to production version of Bearsampp

    29 May 2024

    Bearsampp 2024.5.29 Urgent hotfix

    This is an urgent hotfix resolving the issue where localhost and applications were not working.

    https://github.com/Bearsampp/Bearsampp/releases/download/2024.5.29/Bearsampp-2024.5.29.7z

    Our Supporters

    Sorry, this website uses features that your browser doesn’t support. Upgrade to a newer version of Firefox, Chrome, Safari, or Edge and you’ll be all set.