You are viewing a plain text version of this content. The canonical link for it is here.
Posted to announce@httpd.apache.org by "William A. Rowe Jr." <wr...@apache.org> on 2010/10/19 18:27:33 UTC

[announce] Apache HTTP Server 2.2.17 and 2.0.64 Released

   The Apache Software Foundation and the Apache HTTP Server Project are
   pleased to announce the release of version 2.2.17 of the Apache HTTP
   Server ("Apache").  This version of Apache is principally a bug fix
   release, and a security fix release of the APR-util 1.3.10 dependency;

     * SECURITY: CVE-2010-1623 (cve.mitre.org)
       Fix a denial of service attack against apr_brigade_split_line().

     * SECURITY: CVE-2009-3560, CVE-2009-3720 (cve.mitre.org)
       Fix two buffer over-read flaws in the bundled copy of expat which
       could cause httpd to crash while parsing specially-crafted
       XML documents.

   We consider this release to be the best version of Apache available, and
   encourage users of all prior versions to upgrade.

   Apache HTTP Server 2.2.17 is available for download from:

     http://httpd.apache.org/download.cgi

   Apache HTTP Server 2.0.64 legacy release is also currently available,
   with the same vulnerability correction as well as many others fixed in
   2.2.16 and earlier releases.  See the corresponding CHANGES files linked
   from the download page.  The Apache HTTP Project developers strongly
   encourage all users to migrate to Apache 2.2, as only limited and less
   frequent maintenance is provided for legacy versions.

   Apache 2.2 offers numerous enhancements, improvements, and performance
   boosts over the 2.0 codebase.  For an overview of new features
   introduced since 2.0 please see:

     http://httpd.apache.org/docs/2.2/new_features_2_2.html

   Please see the CHANGES_2.2 file, linked from the download page, for a
   full list of changes.  A condensed list, CHANGES_2.2.17 provides the
   complete list of changes since 2.2.16.  A summary of all of the security
   vulnerabilities addressed in this and earlier releases is available:

     http://httpd.apache.org/security/vulnerabilities_22.html

   This release includes the Apache Portable Runtime (APR) version 1.4.2
   and APR Utility Library (APR-util) version 1.3.10, bundled with the tar
   and zip distributions.  The APR libraries libapr and libaprutil (and
   on Win32, libapriconv version 1.2.1) must all be updated to ensure
   binary compatibility and address many known security and platform bugs.

   This release builds on and extends the Apache 2.0 API.  Modules written
   for Apache 2.0 will need to be recompiled in order to run with Apache
   2.2, and require minimal or no source code changes.

     http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/VERSIONING

   When upgrading or installing this version of Apache, please bear in mind
   that if you intend to use Apache with one of the threaded MPMs (other
   than the Prefork MPM), you must ensure that any modules you will be
   using (and the libraries they depend on) are thread-safe.

Re: [users@httpd] Re: [announce] Apache HTTP Server 2.2.17 and 2.0.64 Released

Posted by "William A. Rowe Jr." <wr...@rowe-clan.net>.
On 10/21/2010 2:50 AM, Matus UHLAR - fantomas wrote:
> 
> I see. Unfortunately, I haven't seen bundled expat version in the announce.
> And luckily, my version is patched.

That is a miscommunication.  Something we hope to remedy in 2.4/3.0 by
unbundling sources that are 'not invented here'.

Glad that you are running an (unreleased) expat from your os vendor!

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
   "   from the digest: users-digest-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org


Re: [users@httpd] Re: [announce] Apache HTTP Server 2.2.17 and 2.0.64 Released

Posted by Matus UHLAR - fantomas <uh...@fantomas.sk>.
> > On 19.10.10 11:27, William A. Rowe Jr. wrote:
> >>      * SECURITY: CVE-2009-3560, CVE-2009-3720 (cve.mitre.org)
> >>        Fix two buffer over-read flaws in the bundled copy of expat which
> >>        could cause httpd to crash while parsing specially-crafted
> >>        XML documents.

> On 10/20/2010 1:44 AM, Matus UHLAR - fantomas wrote:
> > does this mean that if I have apache compiled with external
> > apr-util-1.3.10 and external expat, I am safe?

On 20.10.10 15:05, William A. Rowe Jr. wrote:
> From these two flaws?  Only if your external expat is also up-to-date, refer
> that question to the expat community.

I see. Unfortunately, I haven't seen bundled expat version in the announce.
And luckily, my version is patched.
-- 
Matus UHLAR - fantomas, uhlar@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
"They say when you play that M$ CD backward you can hear satanic messages."
"That's nothing. If you play it forward it will install Windows."

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
   "   from the digest: users-digest-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org


Re: [users@httpd] Re: [announce] Apache HTTP Server 2.2.17 and 2.0.64 Released

Posted by "William A. Rowe Jr." <wr...@rowe-clan.net>.
On 10/20/2010 1:44 AM, Matus UHLAR - fantomas wrote:
> On 19.10.10 11:27, William A. Rowe Jr. wrote:
>> Subject: [announce] Apache HTTP Server 2.2.17 and 2.0.64 Released
> 
>>    The Apache Software Foundation and the Apache HTTP Server Project are
>>    pleased to announce the release of version 2.2.17 of the Apache HTTP
>>    Server ("Apache").  This version of Apache is principally a bug fix
>>    release, and a security fix release of the APR-util 1.3.10 dependency;
>>
>>      * SECURITY: CVE-2010-1623 (cve.mitre.org)
>>        Fix a denial of service attack against apr_brigade_split_line().
>>
>>      * SECURITY: CVE-2009-3560, CVE-2009-3720 (cve.mitre.org)
>>        Fix two buffer over-read flaws in the bundled copy of expat which
>>        could cause httpd to crash while parsing specially-crafted
>>        XML documents.
> 
> does this mean that if I have apache compiled with external
> apr-util-1.3.10 and external expat, I am safe?

>From these two flaws?  Only if your external expat is also up-to-date, refer
that question to the expat community.

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
   "   from the digest: users-digest-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org


[users@httpd] Re: [announce] Apache HTTP Server 2.2.17 and 2.0.64 Released

Posted by Matus UHLAR - fantomas <uh...@fantomas.sk>.
On 19.10.10 11:27, William A. Rowe Jr. wrote:
> Subject: [announce] Apache HTTP Server 2.2.17 and 2.0.64 Released

>    The Apache Software Foundation and the Apache HTTP Server Project are
>    pleased to announce the release of version 2.2.17 of the Apache HTTP
>    Server ("Apache").  This version of Apache is principally a bug fix
>    release, and a security fix release of the APR-util 1.3.10 dependency;
> 
>      * SECURITY: CVE-2010-1623 (cve.mitre.org)
>        Fix a denial of service attack against apr_brigade_split_line().
> 
>      * SECURITY: CVE-2009-3560, CVE-2009-3720 (cve.mitre.org)
>        Fix two buffer over-read flaws in the bundled copy of expat which
>        could cause httpd to crash while parsing specially-crafted
>        XML documents.

does this mean that if I have apache compiled with external
apr-util-1.3.10 and external expat, I am safe?

-- 
Matus UHLAR - fantomas, uhlar@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
"Where do you want to go to die?" [Microsoft]

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
   "   from the digest: users-digest-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org