You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by wr...@apache.org on 2017/01/11 00:53:47 UTC
svn commit: r17757 - in /dev/httpd: Announcement2.2.html Announcement2.2.txt
Author: wrowe
Date: Wed Jan 11 00:53:47 2017
New Revision: 17757
Log:
Not really sure if 'httpoxy' falls in this category
Modified:
dev/httpd/Announcement2.2.html
dev/httpd/Announcement2.2.txt
Modified: dev/httpd/Announcement2.2.html
==============================================================================
--- dev/httpd/Announcement2.2.html (original)
+++ dev/httpd/Announcement2.2.html Wed Jan 11 00:53:47 2017
@@ -15,22 +15,20 @@
<img src="../../images/apache_sub.gif" alt="" />
<h1>
- Apache HTTP Server 2.2.31 Released
+ Apache HTTP Server 2.2.32 Released
</h1>
<p>
The Apache Software Foundation and the Apache HTTP Server Project are
- pleased to announce the release of version 2.2.31 of the Apache HTTP
- Server ("Apache"). (Note that 2.2.30 was not released). This version
- of Apache is principally a security and bug fix maintenance release,
- and addresses these specific security defects as well as other fixes;
+ pleased to announce the release of version 2.2.32 of the Apache HTTP
+ Server ("Apache"). This version of Apache is principally a security
+ and bug fix maintenance release, and addresses these specific security
+ defects as well as other fixes;
</p>
<ul>
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183">CVE-2015-3183</a>
- core: Fix chunk header parsing defect.
- Remove apr_brigade_flatten(), buffering and duplicated code from
- the HTTP_IN filter, parse chunks in a single pass with zero copy.
- Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext
- authorized characters.
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743">CVE-2016-8743</a>
+ Enforce HTTP request grammar corresponding to RFC7230 for request
+ lines and request headers, to prevent response splitting and cache
+ pollution by malicious clients or downstream proxies.
</li>
</ul>
<p>
@@ -56,7 +54,7 @@
>http://www.apache.org/dist/httpd/Announcement2.4.html</a></dd>
</dl>
<p>
- Apache HTTP Server 2.4 and 2.2.31 are available for download from:
+ Apache HTTP Server 2.4 and 2.2.32 are available for download from:
</p>
<dl>
<dd><a href="http://httpd.apache.org/download.cgi"
@@ -64,7 +62,7 @@
</dl>
<p>
Please see the CHANGES_2.2 file, linked from the download page, for a
- full list of changes. A condensed list, CHANGES_2.2.31 includes only
+ full list of changes. A condensed list, CHANGES_2.2.32 includes only
those changes introduced since the prior 2.2 release. A summary of all
of the security vulnerabilities addressed in this and earlier releases
is available:
@@ -84,6 +82,12 @@
from earlier httpd 2.2 source distributions.
</p>
<p>
+ Note this package also includes very stale and known-vulnerable versions
+ of the Expat [http://expat.sourceforge.net/] and PCRE [http://www.pcre.org/]
+ packages. Users are strongly encouraged to first install the most recent
+ versions of these components.
+</p>
+<p>
This release builds on and extends the Apache 2.0 API and is superceeded
by the Apache 2.4 API. Modules written for Apache 2.0 or 2.4 will need
to be recompiled in order to run with Apache 2.2, and most will require
@@ -95,6 +99,5 @@
than the Prefork MPM), you must ensure that any modules you will be
using (and the libraries they depend on) are thread-safe.
</p>
-
</body>
</html>
Modified: dev/httpd/Announcement2.2.txt
==============================================================================
--- dev/httpd/Announcement2.2.txt (original)
+++ dev/httpd/Announcement2.2.txt Wed Jan 11 00:53:47 2017
@@ -1,17 +1,15 @@
- Apache HTTP Server 2.2.31 Released
+ Apache HTTP Server 2.2.32 Released
The Apache Software Foundation and the Apache HTTP Server Project are
- pleased to announce the release of version 2.2.31 of the Apache HTTP
- Server ("Apache"). (Note that 2.2.30 was not released). This version
- of Apache is principally a security and bug fix maintenance release,
- and addresses these specific security defects as well as other fixes;
-
- CVE-2015-3183 (cve.mitre.org)
- core: Fix chunk header parsing defect.
- Remove apr_brigade_flatten(), buffering and duplicated code from
- the HTTP_IN filter, parse chunks in a single pass with zero copy.
- Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext
- authorized characters.
+ pleased to announce the release of version 2.2.32 of the Apache HTTP
+ Server ("Apache"). This version of Apache is principally a security
+ and bug fix maintenance release, and addresses these specific security
+ defects as well as other fixes;
+
+ CVE-2016-8743 (cve.mitre.org)
+ Enforce HTTP request grammar corresponding to RFC7230 for request
+ lines and request headers, to prevent response splitting and cache
+ pollution by malicious clients or downstream proxies.
We consider the Apache HTTP Server 2.4 release to be the best version
of Apache available, and encourage users of 2.2 and all prior versions
@@ -30,12 +28,12 @@
http://www.apache.org/dist/httpd/Announcement2.4.txt
- Apache HTTP Server 2.4 and 2.2.31 are available for download from:
+ Apache HTTP Server 2.4 and 2.2.32 are available for download from:
http://httpd.apache.org/download.cgi
Please see the CHANGES_2.2 file, linked from the download page, for a
- full list of changes. A condensed list, CHANGES_2.2.31 includes only
+ full list of changes. A condensed list, CHANGES_2.2.32 includes only
those changes introduced since the prior 2.2 release. A summary of all
of the security vulnerabilities addressed in this and earlier releases
is available:
@@ -50,6 +48,11 @@
APR version 1.5 and APR-util version 1.5 represent minor version upgrades
from earlier httpd 2.2 source distributions.
+ Note this package also includes very stale and known-vulnerable versions
+ of the Expat [http://expat.sourceforge.net/] and PCRE [http://www.pcre.org/]
+ packages. Users are strongly encouraged to first install the most recent
+ versions of these components.
+
This release builds on and extends the Apache 2.0 API and is superceeded
by the Apache 2.4 API. Modules written for Apache 2.0 or 2.4 will need
to be recompiled in order to run with Apache 2.2, and most will require
@@ -60,3 +63,10 @@
than the Prefork MPM), you must ensure that any modules you will be
using (and the libraries they depend on) are thread-safe.
+ Please note that Apache Web Server Project will only provide maintenance
+ releases of the 2.2.x flavor through June of 2017, and will provide some
+ security patches beyond this date through at least December of 2017.
+ Minimal maintenance patches of 2.2.x are expected throughout this period,
+ and users are strongly encouraged to promptly complete their transitions
+ to the the 2.4.x flavor of httpd to benefit from a much larger assortment
+ of minor security and bug fixes as well as new features.
Re: svn commit: r17757 - in /dev/httpd: Announcement2.2.html Announcement2.2.txt
Posted by William A Rowe Jr <wr...@rowe-clan.net>.
On Tue, Jan 10, 2017 at 6:53 PM, <wr...@apache.org> wrote:
> Author: wrowe
> Date: Wed Jan 11 00:53:47 2017
> New Revision: 17757
>
> Log:
> Not really sure if 'httpoxy' falls in this category
We call out "security defects", httpoxy is not a (web server) defect,
so my inclination
is to call out "security defects and enhancements" or omit httpoxy
from the primary
announcement text
> Modified:
> dev/httpd/Announcement2.2.html
> dev/httpd/Announcement2.2.txt
The draft is at
http://httpd.apache.org/dev/dist/Announcement2.2.html
http://httpd.apache.org/dev/dist/Announcement2.2.txt
Any remaining edits to suggest? The files live in
https://dist.apache.org/repos/dist/dev/httpd/