Date: Sun, 20 Jan 2008 10:46:16 -0500 From: madodel Subject: [VOICENWS] SW: Apache HTTP Server 2.2.8 Released ++ From the VOICE OS/2-eCS News Service http://www.os2voice.org ++ From: Paul Smedley Hi All, In line with the below announcement, a port of Apache2 v2.2.8 is now available from my site at http://os2ports.smedley.info Enjoy! Cheers, Paul. -------- Original Message -------- Subject: [ANNOUNCEMENT] Apache HTTP Server 2.2.8 (2.0.63, 1.3.41) Released Date: Sat, 19 Jan 2008 12:02:26 -0500 From: Jim Jagielski Apache HTTP Server 2.2.8 Released The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.2.8 of the Apache HTTP Server ("Apache"). This version of Apache is principally a bug and security fix release. The following potential security flaws are addressed: * CVE-2007-6421 (cve.mitre.org) mod_proxy_balancer: Correctly escape the worker route and the worker redirect string in the HTML output of the balancer manager. Reported by SecurityReason. A flaw was found in the mod_proxy_balancer module. On sites where mod_proxy_balancer is enabled, a cross-site scripting attack against an authorized user is possible. * CVE-2007-6422 (cve.mitre.org) Prevent crash in balancer manager if invalid balancer name is passed as parameter. Reported by SecurityReason. A flaw was found in the mod_proxy_balancer module. On sites where mod_proxy_balancer is enabled, an authorized user could send a carefully crafted request that would cause the Apache child process handling that request to crash. This could lead to a denial of service if using a threaded Multi-Processing Module. * CVE-2007-6388 (cve.mitre.org) mod_status: Ensure refresh parameter is numeric to prevent a possible XSS attack caused by redirecting to other URLs. Reported by SecurityReason. A flaw was found in the mod_status module. On sites where mod_status is enabled and the status pages were publicly accessible, a cross-site scripting attack is possible. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available. * CVE-2007-5000 (cve.mitre.org) mod_imagemap: Fix a cross-site scripting issue. Reported by JPCERT. A flaw was found in the mod_imap module. On sites where mod_imap is enabled and an imagemap file is publicly available, a cross-site scripting attack is possible. We consider this release to be the best version of Apache available, and encourage users of all prior versions to upgrade. Apache 2.2 offers numerous enhancements, improvements, and performance boosts over the 2.0 codebase. For an overview of new features introduced since 2.0 please see: http://httpd.apache.org/docs/2.2/new_features_2_2.html Please see the CHANGES_2.2 file, linked from the download page, for a full list of changes. A condensed list, CHANGES_2.2.8 provides the complete list of changes since 2.2.6 (2.2.7 was not released). A summary of security vulnerabilities which were addressed in the previous 2.2.6 and earlier releases is available: http://httpd.apache.org/security/vulnerabilities_22.html This release builds on and extends the Apache 2.0 API. Modules written for Apache 2.0 will need to be recompiled in order to run with Apache 2.2, and require minimal or no source code changes. -- For a choice in the future of personal computing, Join VOICE - http://www.os2voice.org [Moderator's note: All posts are sent without guarantee to the accuracy of the content. We try to verify details and URLs but this is an entirely volunteer run list, so 100% fact checking and the quality/useability of products announced here is impossible. If you respond to this post please remove the DESPAM from the poster's email addresses. Please do not send requests for information about a specific post to the moderator unless it is an update or I sent it.] -- To unsubscribe yourself from this list, send the following message to majormajor at os2voice.org unsubscribe news your.email.address at here end Or, visit http://www.os2voice.org/MailingLists.html If you have an announcement you would like posted to the VOICE News list, please send it to submit at os2voice.org or go to http://www.os2voice.org/SubmitNews.php . Please include a valid reply address and a real contact name. If you wish to comment on this post, please reply to feedback at os2voice.org