You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by sl...@apache.org on 2003/01/21 03:57:23 UTC

cvs commit: httpd-site/docs index.html

slive       2003/01/20 18:57:23

  Modified:    xdocs    index.xml
               docs     index.html
  Log:
  Freshen up the httpd.apache.org main page.  Note the new release
  and nix the big security blurb.
  
  Revision  Changes    Path
  1.39      +11 -63    httpd-site/xdocs/index.xml
  
  Index: index.xml
  ===================================================================
  RCS file: /home/cvs/httpd-site/xdocs/index.xml,v
  retrieving revision 1.38
  retrieving revision 1.39
  diff -u -d -b -u -r1.38 -r1.39
  --- index.xml	28 Oct 2002 17:54:30 -0000	1.38
  +++ index.xml	21 Jan 2003 02:57:23 -0000	1.39
  @@ -34,78 +34,26 @@
   experience.</p>
   
   <p>Please ensure that you <a href="/download.cgi#verify">verify</a>
  -any downloads from a mirror!</p>
  -</section>
  -
  -<section id="Security">
  -<title>Recent Security Issues</title>
  -
  -<p>Over the last months several security problems have
  -been discovered in the Apache source code and in third-party
  -code that many websites rely on.  Some of these problems are now
  -being actively exploited on the Internet.</p>
  -
  -<p>Please note that the recent Linux / Apache / mod_ssl / OpenSSL worm
  -is exploiting a problem in the <a
  -href="http://www.openssl.org/">OpenSSL</a> source code and not a
  -problem specific to the Apache HTTP Server source code.  To fix this
  -problem, you must upgrade your OpenSSL library, not your HTTP Server.</p>
  -
  -<p>To assure that you are protected, please do the following:</p>
  -
  -<ul>
  -<li>If you are running an SSL-enabled web server using OpenSSL,
  -upgrade to at least version 0.9.6e of OpenSSL and recompile all
  -applications that use OpenSSL.</li> 
  -
  -<li>Upgrade your Apache HTTP Server to version 1.3.27 or 2.0.43 or
  -higher.  (Unix systems are safe at version 2.0.39.)</li>
  -</ul>
  -
  -<p>References:</p>
  -
  -<ul>
  -<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839"> Apache HTTP Server Advisory CAN-2002-0839 (mitre.org)</a></li>
  -
  -<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840"> Apache HTTP Server Advisory CAN-2002-0840 (mitre.org)</a></li>
  -
  -<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843"> Apache HTTP Server Advisory CAN-2002-0843 (mitre.org)</a></li>
  -
  -<li><a href="http://www.openssl.org/news/secadv_20020730.txt">OpenSSL
  -Security Advisory</a></li>
  -
  -<li><a href="http://www.cert.org/advisories/CA-2002-27.html">CERT
  -Advisory CA-2002-27</a></li>
  -
  -<li><a href="http://www.cert.org/advisories/CA-2002-23.html">CERT
  -Advisory CA-2002-23</a></li>
  -
  -<li><a href="info/security_bulletin_20020809a.txt">Apache HTTP Server
  -Advisory CAN-2002-0661</a></li>
  -
  -<li><a href="info/security_bulletin_20020620.txt">Apache HTTP Server
  -Advisory CAN-2002-0392</a></li>
  -
  -<li><a href="http://www.cert.org/advisories/CA-2002-17.html">CERT
  -Advisory CA-2002-17</a></li>
  -</ul>
  +your downloads using PGP or MD5 signatures!</p>
   </section>
   
  -<section id="2.0.43">
  -<title>Apache 2.0.43 Released</title>
  +<section id="2.0.44">
  +<title>Apache 2.0.44 Released</title>
   
   <p>The Apache HTTP Server Project is proud to <a
   href="http://www.apache.org/dist/httpd/Announcement2.html">announce the
  -sixth public release of Apache 2.0</a>.  Apache 2.0 has been running on the
  -apache.org website since December of 2000 and has proven to be very
  -reliable.</p>
  -<p>
  - This release is primarily a Security Fix for <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840"> CAN-2002-0840 (mitre.org)</a> </p>
  +seventh public release of Apache 2.0</a>.</p>
  +
  +<p>This release begins a new effort to retain configuration and
  +module-interface stability in the Apache 2.0 series.  No changes
  +in configuration or third-party modules are necessary to upgrade from
  +2.0.42 or later, and we will make every effort to maintain this easy
  +upgrade path in future 2.0 releases.</p>
   
   <p align="center">
   <a href="download.cgi">Download</a> | 
   <a href="docs-2.0/new_features_2_0.html">New Features in Apache 2.0</a> |
  -<a href="http://www.apache.org/dist/httpd/CHANGES_2.0">ChangeLog for 2.0.42</a>
  +<a href="http://www.apache.org/dist/httpd/CHANGES_2.0">ChangeLog for 2.0</a>
   </p>
   
   </section>
  
  
  
  1.54      +9 -62     httpd-site/docs/index.html
  
  Index: index.html
  ===================================================================
  RCS file: /home/cvs/httpd-site/docs/index.html,v
  retrieving revision 1.53
  retrieving revision 1.54
  diff -u -d -b -u -r1.53 -r1.54
  --- index.html	28 Dec 2002 21:12:17 -0000	1.53
  +++ index.html	21 Jan 2003 02:57:23 -0000	1.54
  @@ -87,82 +87,29 @@
   to use our mirrors that we will be able to provide a better download
   experience.</p>
   <p>Please ensure that you <a href="/download.cgi#verify">verify</a>
  -any downloads from a mirror!</p>
  -  </blockquote>
  - </td></tr>
  -</table>
  -           <table border="0" cellspacing="0" cellpadding="2" width="100%">
  - <tr><td bgcolor="#525D76">
  -  <font color="#ffffff" face="arial,helvetica,sanserif">
  -   <a name="Security"><strong>Recent Security Issues</strong></a>
  -  </font>
  - </td></tr>
  - <tr><td>
  -  <blockquote>
  -<p>Over the last months several security problems have
  -been discovered in the Apache source code and in third-party
  -code that many websites rely on.  Some of these problems are now
  -being actively exploited on the Internet.</p>
  -<p>Please note that the recent Linux / Apache / mod_ssl / OpenSSL worm
  -is exploiting a problem in the <a href="http://www.openssl.org/">OpenSSL</a> source code and not a
  -problem specific to the Apache HTTP Server source code.  To fix this
  -problem, you must upgrade your OpenSSL library, not your HTTP Server.</p>
  -<p>To assure that you are protected, please do the following:</p>
  -<ul>
  -<li>If you are running an SSL-enabled web server using OpenSSL,
  -upgrade to at least version 0.9.6e of OpenSSL and recompile all
  -applications that use OpenSSL.</li> 
  -
  -<li>Upgrade your Apache HTTP Server to version 1.3.27 or 2.0.43 or
  -higher.  (Unix systems are safe at version 2.0.39.)</li>
  -</ul>
  -<p>References:</p>
  -<ul>
  -<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839"> Apache HTTP Server Advisory CAN-2002-0839 (mitre.org)</a></li>
  -
  -<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840"> Apache HTTP Server Advisory CAN-2002-0840 (mitre.org)</a></li>
  -
  -<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843"> Apache HTTP Server Advisory CAN-2002-0843 (mitre.org)</a></li>
  -
  -<li><a href="http://www.openssl.org/news/secadv_20020730.txt">OpenSSL
  -Security Advisory</a></li>
  -
  -<li><a href="http://www.cert.org/advisories/CA-2002-27.html">CERT
  -Advisory CA-2002-27</a></li>
  -
  -<li><a href="http://www.cert.org/advisories/CA-2002-23.html">CERT
  -Advisory CA-2002-23</a></li>
  -
  -<li><a href="info/security_bulletin_20020809a.txt">Apache HTTP Server
  -Advisory CAN-2002-0661</a></li>
  -
  -<li><a href="info/security_bulletin_20020620.txt">Apache HTTP Server
  -Advisory CAN-2002-0392</a></li>
  -
  -<li><a href="http://www.cert.org/advisories/CA-2002-17.html">CERT
  -Advisory CA-2002-17</a></li>
  -</ul>
  +your downloads using PGP or MD5 signatures!</p>
     </blockquote>
    </td></tr>
   </table>
              <table border="0" cellspacing="0" cellpadding="2" width="100%">
    <tr><td bgcolor="#525D76">
     <font color="#ffffff" face="arial,helvetica,sanserif">
  -   <a name="2.0.43"><strong>Apache 2.0.43 Released</strong></a>
  +   <a name="2.0.44"><strong>Apache 2.0.44 Released</strong></a>
     </font>
    </td></tr>
    <tr><td>
     <blockquote>
   <p>The Apache HTTP Server Project is proud to <a href="http://www.apache.org/dist/httpd/Announcement2.html">announce the
  -sixth public release of Apache 2.0</a>.  Apache 2.0 has been running on the
  -apache.org website since December of 2000 and has proven to be very
  -reliable.</p>
  -<p>
  - This release is primarily a Security Fix for <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840"> CAN-2002-0840 (mitre.org)</a> </p>
  +seventh public release of Apache 2.0</a>.</p>
  +<p>This release begins a new effort to retain configuration and
  +module-interface stability in the Apache 2.0 series.  No changes
  +in configuration or third-party modules are necessary to upgrade from
  +2.0.42 or later, and we will make every effort to maintain this easy
  +upgrade path in future 2.0 releases.</p>
   <p align="center">
   <a href="download.cgi">Download</a> | 
   <a href="docs-2.0/new_features_2_0.html">New Features in Apache 2.0</a> |
  -<a href="http://www.apache.org/dist/httpd/CHANGES_2.0">ChangeLog for 2.0.42</a>
  +<a href="http://www.apache.org/dist/httpd/CHANGES_2.0">ChangeLog for 2.0</a>
   </p>
     </blockquote>
    </td></tr>