Apache HTTP Server 2.2.8 Released

마루 0 20,942 2008.01.27 17:36
http://www.ecomstation.com/news.phtml?action=fullnews&id=2565&title=Apache%20HTTP%20Server%202.2.8%20Released Apache HTTP Server 2.2.8 Released

January 20, 2008 by Paul Smedley

++ From the VOICE OS/2-eCS News Service http://www.os2voice.org ++

From: Paul Smedley

Hi All,

In line with the below announcement, a port of Apache2 v2.2.8 is now
available from my site at http://os2ports.smedley.info

Enjoy!

Cheers,

Paul.

-------- Original Message --------
Subject: [ANNOUNCEMENT] Apache HTTP Server 2.2.8 (2.0.63, 1.3.41) Released
Date: Sat, 19 Jan 2008 12:02:26 -0500
From: Jim Jagielski


Apache HTTP Server 2.2.8 Released

The Apache Software Foundation and the Apache HTTP Server Project are
pleased to announce the release of version 2.2.8 of the Apache HTTP Server
("Apache"). This version of Apache is principally a bug and security fix
release. The following potential security flaws are addressed:

* CVE-2007-6421 (cve.mitre.org)
mod_proxy_balancer: Correctly escape the worker route and the worker
redirect string in the HTML output of the balancer manager.
Reported by SecurityReason.

A flaw was found in the mod_proxy_balancer module. On sites
where mod_proxy_balancer is enabled, a cross-site scripting attack
against an authorized user is possible.

* CVE-2007-6422 (cve.mitre.org)
Prevent crash in balancer manager if invalid balancer name is passed as
parameter. Reported by SecurityReason.

A flaw was found in the mod_proxy_balancer module. On sites where
mod_proxy_balancer is enabled, an authorized user could send a
carefully crafted request that would cause the Apache child process
handling that request to crash. This could lead to a denial of
service if using a threaded Multi-Processing Module.

* CVE-2007-6388 (cve.mitre.org)
mod_status: Ensure refresh parameter is numeric to prevent
a possible XSS attack caused by redirecting to other URLs.
Reported by SecurityReason.

A flaw was found in the mod_status module. On sites where
mod_status is enabled and the status pages were publicly accessible, a
cross-site scripting attack is possible. Note that the server-status
page is not enabled by default and it is best practice to not make
this publicly available.

* CVE-2007-5000 (cve.mitre.org)
mod_imagemap: Fix a cross-site scripting issue. Reported by JPCERT.

A flaw was found in the mod_imap module. On sites where mod_imap is enabled
and an imagemap file is publicly available, a cross-site scripting attack
is possible.

We consider this release to be the best version of Apache available, and
encourage users of all prior versions to upgrade.

Apache 2.2 offers numerous enhancements, improvements, and performance
boosts over the 2.0 codebase. For an overview of new features introduced
since 2.0 please see:

http://httpd.apache.org/docs/2.2/new_features_2_2.html

Please see the CHANGES_2.2 file, linked from the download page, for a full
list of changes. A condensed list, CHANGES_2.2.8 provides the complete
list of changes since 2.2.6 (2.2.7 was not released). A summary of security
vulnerabilities which were addressed in the previous 2.2.6 and earlier
releases is available:

http://httpd.apache.org/security/vulnerabilities_22.html

This release builds on and extends the Apache 2.0 API. Modules written
for Apache 2.0 will need to be recompiled in order to run with Apache 2.2,
and require minimal or no source code changes.

----
오투용 아파치 2.0이 그래도 잘 나가네요.

Comments

Category
State
  • 현재 접속자 234 명
  • 오늘 방문자 617 명
  • 어제 방문자 1,567 명
  • 최대 방문자 11,402 명
  • 전체 방문자 2,448,998 명
  • 전체 게시물 3,052 개
  • 전체 댓글수 4,592 개
  • 전체 회원수 104 명

- 쇼핑몰 : Softbox
- 예전 문서 / Old docs
- FTP Server: http://ftp.hanmesoft.com
Facebook Twitter GooglePlus KakaoStory NaverBand