httpd-announce mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Jim Jagielski <>
Subject [ANNOUNCEMENT] Apache HTTP Server 2.2.8 (2.0.63, 1.3.41) Released
Date Sat, 19 Jan 2008 17:02:26 GMT
                        Apache HTTP Server 2.2.8 Released

    The Apache Software Foundation and the Apache HTTP Server Project  
    pleased to announce the release of version 2.2.8 of the Apache  
HTTP Server
    ("Apache").  This version of Apache is principally a bug and  
security fix
    release. The following potential security flaws are addressed:

      * CVE-2007-6421 (
        mod_proxy_balancer: Correctly escape the worker route and the  
        redirect string in the HTML output of the balancer manager.
        Reported by SecurityReason.

        A flaw was found in the mod_proxy_balancer module. On sites  
        mod_proxy_balancer is enabled, a cross-site scripting attack  
        an authorized user is possible.

      * CVE-2007-6422 (
        Prevent crash in balancer manager if invalid balancer name is  
        as parameter. Reported by SecurityReason.

        A flaw was found in the mod_proxy_balancer module. On sites  
        mod_proxy_balancer is enabled, an authorized user could send a
        carefully crafted request that would cause the Apache child  
        handling that request to crash. This could lead to a denial of
        service if using a threaded Multi-Processing Module.

      * CVE-2007-6388 (
        mod_status: Ensure refresh parameter is numeric to prevent
        a possible XSS attack caused by redirecting to other URLs.
        Reported by SecurityReason.

        A flaw was found in the mod_status module. On sites where  
        is enabled and the status pages were publicly accessible, a
        cross-site scripting attack is possible. Note that the server- 
        page is not enabled by default and it is best practice to not  
        this publicly available.

      * CVE-2007-5000 (
        mod_imagemap: Fix a cross-site scripting issue.  Reported by  

        A flaw was found in the mod_imap module. On sites where
        mod_imap is enabled and an imagemap file is publicly  
available, a
        cross-site scripting attack is possible.

    We consider this release to be the best version of Apache  
available, and
    encourage users of all prior versions to upgrade.

    Apache HTTP Server 2.2.8 is available for download from:

    Apache 2.2 offers numerous enhancements, improvements, and  
    boosts over the 2.0 codebase.  For an overview of new features  
    since 2.0 please see:

    Please see the CHANGES_2.2 file, linked from the download page,  
for a
    full list of changes.  A condensed list, CHANGES_2.2.8 provides the
    complete list of changes since 2.2.6 (2.2.7 was not released). A  
    of security vulnerabilities which were addressed in the previous  
    and earlier releases is available:

    Apache HTTP Server 1.3.41 and 2.0.63 legacy releases are also  
    available.  See the appropriate CHANGES from the url above.  See the
    corresponding CHANGES files linked from the download page.  The  
    HTTP Project developers strongly encourage all users to migrate to
    Apache 2.2, as only limited maintenance is performed on these legacy

    This release includes the Apache Portable Runtime (APR) version  
    bundled with the tar and zip distributions.  The APR libraries  
    and libaprutil (and on Win32, libapriconv) must all be updated to  
    binary compatibility and address many known platform bugs.

    This release builds on and extends the Apache 2.0 API.  Modules  
    for Apache 2.0 will need to be recompiled in order to run with  
Apache 2.2,
    and require minimal or no source code changes. 

    When upgrading or installing this version of Apache, please bear  
in mind
    that if you intend to use Apache with one of the threaded MPMs  
    than the Prefork MPM), you must ensure that any modules you will  
be using
    (and the libraries they depend on) are thread-safe.

View raw message