Login | Register For Free | Help
Search for: (Advanced)

Mailing List Archive: Apache: Announce
[ANNOUNCEMENT] Apache HTTP Server 2.2.8 (2.0.63, 1.3.41) Released
 

Index | Next | Previous | View Flat


jim at apache

Jan 19, 2008, 9:02 AM


Views: 3188
Permalink
[ANNOUNCEMENT] Apache HTTP Server 2.2.8 (2.0.63, 1.3.41) Released

Apache HTTP Server 2.2.8 Released

The Apache Software Foundation and the Apache HTTP Server Project
are
pleased to announce the release of version 2.2.8 of the Apache
HTTP Server
("Apache"). This version of Apache is principally a bug and
security fix
release. The following potential security flaws are addressed:

* CVE-2007-6421 (cve.mitre.org)
mod_proxy_balancer: Correctly escape the worker route and the
worker
redirect string in the HTML output of the balancer manager.
Reported by SecurityReason.

A flaw was found in the mod_proxy_balancer module. On sites
where
mod_proxy_balancer is enabled, a cross-site scripting attack
against
an authorized user is possible.

* CVE-2007-6422 (cve.mitre.org)
Prevent crash in balancer manager if invalid balancer name is
passed
as parameter. Reported by SecurityReason.

A flaw was found in the mod_proxy_balancer module. On sites
where
mod_proxy_balancer is enabled, an authorized user could send a
carefully crafted request that would cause the Apache child
process
handling that request to crash. This could lead to a denial of
service if using a threaded Multi-Processing Module.

* CVE-2007-6388 (cve.mitre.org)
mod_status: Ensure refresh parameter is numeric to prevent
a possible XSS attack caused by redirecting to other URLs.
Reported by SecurityReason.

A flaw was found in the mod_status module. On sites where
mod_status
is enabled and the status pages were publicly accessible, a
cross-site scripting attack is possible. Note that the server-
status
page is not enabled by default and it is best practice to not
make
this publicly available.

* CVE-2007-5000 (cve.mitre.org)
mod_imagemap: Fix a cross-site scripting issue. Reported by
JPCERT.

A flaw was found in the mod_imap module. On sites where
mod_imap is enabled and an imagemap file is publicly
available, a
cross-site scripting attack is possible.

We consider this release to be the best version of Apache
available, and
encourage users of all prior versions to upgrade.

Apache HTTP Server 2.2.8 is available for download from:

http://httpd.apache.org/download.cgi

Apache 2.2 offers numerous enhancements, improvements, and
performance
boosts over the 2.0 codebase. For an overview of new features
introduced
since 2.0 please see:

http://httpd.apache.org/docs/2.2/new_features_2_2.html

Please see the CHANGES_2.2 file, linked from the download page,
for a
full list of changes. A condensed list, CHANGES_2.2.8 provides the
complete list of changes since 2.2.6 (2.2.7 was not released). A
summary
of security vulnerabilities which were addressed in the previous
2.2.6
and earlier releases is available:

http://httpd.apache.org/security/vulnerabilities_22.html

Apache HTTP Server 1.3.41 and 2.0.63 legacy releases are also
currently
available. See the appropriate CHANGES from the url above. See the
corresponding CHANGES files linked from the download page. The
Apache
HTTP Project developers strongly encourage all users to migrate to
Apache 2.2, as only limited maintenance is performed on these legacy
versions.

This release includes the Apache Portable Runtime (APR) version
1.2.12
bundled with the tar and zip distributions. The APR libraries
libapr
and libaprutil (and on Win32, libapriconv) must all be updated to
ensure
binary compatibility and address many known platform bugs.

This release builds on and extends the Apache 2.0 API. Modules
written
for Apache 2.0 will need to be recompiled in order to run with
Apache 2.2,
and require minimal or no source code changes.

http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/
VERSIONING

When upgrading or installing this version of Apache, please bear
in mind
that if you intend to use Apache with one of the threaded MPMs
(other
than the Prefork MPM), you must ensure that any modules you will
be using
(and the libraries they depend on) are thread-safe.

Subject User Time
[ANNOUNCEMENT] Apache HTTP Server 2.2.8 (2.0.63, 1.3.41) Released jim at apache Jan 19, 2008, 9:02 AM

  Index | Next | Previous | View Flat
 
 


Interested in having your list archived? Contact Gossamer Threads
 
  Web Applications & Managed Hosting Powered by Gossamer Threads Inc.