|tag name||v0.97.1 (815ae08e9c86bdcff5c22d68f36d4a9fcbaeabe8)|
|tag date||2010-04-19 14:00:59 -0700|
|tagged by||Eric Wong <email@example.com>|
|tagged object||commit 3ce92574b3...|
unicorn 0.97.1 - fix HTTP parser for Rainbows!/Zbatery
This release fixes a denial-of-service vector for derived servers exposed directly to untrusted clients. This bug does not affect most Unicorn deployments as Unicorn is only supported with trusted clients (such as nginx) on a LAN. nginx is known to reject clients that send invalid Content-Length headers, so any deployments on a trusted LAN and/or behind nginx are safe. Servers affected by this bug include (but are not limited to) Rainbows! and Zbatery. This bug does not affect Thin nor Mongrel, as neither got the request body filtering treatment that the Unicorn HTTP parser got in August 2009. The bug fixed in this release could result in a denial-of-service as it would trigger a process-wide assertion instead of raising an exception. For servers such as Rainbows!/Zbatery that serve multiple clients per worker process, this could abort all clients connected to the particular worker process that hit the assertion.