http://www.ecomstation.com/news.phtml?action=fullnews&id=2565&title=Apache%20HTTP%20Server%202.2.8%20Released Apache HTTP Server 2.2.8 Released
January 20, 2008 by Paul Smedley
++ From the VOICE OS/2-eCS News Service http://www.os2voice.org ++
From: Paul Smedley
Hi All,
In line with the below announcement, a port of Apache2 v2.2.8 is now
available from my site at http://os2ports.smedley.info
Enjoy!
Cheers,
Paul.
-------- Original Message --------
Subject: [ANNOUNCEMENT] Apache HTTP Server 2.2.8 (2.0.63, 1.3.41) Released
Date: Sat, 19 Jan 2008 12:02:26 -0500
From: Jim Jagielski
Apache HTTP Server 2.2.8 Released
The Apache Software Foundation and the Apache HTTP Server Project are
pleased to announce the release of version 2.2.8 of the Apache HTTP Server
("Apache"). This version of Apache is principally a bug and security fix
release. The following potential security flaws are addressed:
* CVE-2007-6421 (cve.mitre.org)
mod_proxy_balancer: Correctly escape the worker route and the worker
redirect string in the HTML output of the balancer manager.
Reported by SecurityReason.
A flaw was found in the mod_proxy_balancer module. On sites
where mod_proxy_balancer is enabled, a cross-site scripting attack
against an authorized user is possible.
* CVE-2007-6422 (cve.mitre.org)
Prevent crash in balancer manager if invalid balancer name is passed as
parameter. Reported by SecurityReason.
A flaw was found in the mod_proxy_balancer module. On sites where
mod_proxy_balancer is enabled, an authorized user could send a
carefully crafted request that would cause the Apache child process
handling that request to crash. This could lead to a denial of
service if using a threaded Multi-Processing Module.
* CVE-2007-6388 (cve.mitre.org)
mod_status: Ensure refresh parameter is numeric to prevent
a possible XSS attack caused by redirecting to other URLs.
Reported by SecurityReason.
A flaw was found in the mod_status module. On sites where
mod_status is enabled and the status pages were publicly accessible, a
cross-site scripting attack is possible. Note that the server-status
page is not enabled by default and it is best practice to not make
this publicly available.
* CVE-2007-5000 (cve.mitre.org)
mod_imagemap: Fix a cross-site scripting issue. Reported by JPCERT.
A flaw was found in the mod_imap module. On sites where mod_imap is enabled
and an imagemap file is publicly available, a cross-site scripting attack
is possible.
We consider this release to be the best version of Apache available, and
encourage users of all prior versions to upgrade.
Apache 2.2 offers numerous enhancements, improvements, and performance
boosts over the 2.0 codebase. For an overview of new features introduced
since 2.0 please see:
http://httpd.apache.org/docs/2.2/new_features_2_2.html
Please see the CHANGES_2.2 file, linked from the download page, for a full
list of changes. A condensed list, CHANGES_2.2.8 provides the complete
list of changes since 2.2.6 (2.2.7 was not released). A summary of security
vulnerabilities which were addressed in the previous 2.2.6 and earlier
releases is available:
http://httpd.apache.org/security/vulnerabilities_22.html
This release builds on and extends the Apache 2.0 API. Modules written
for Apache 2.0 will need to be recompiled in order to run with Apache 2.2,
and require minimal or no source code changes.
----
오투용 아파치 2.0이 그래도 잘 나가네요.