-----BEGIN PGP SIGNED MESSAGE-----
Apache 2.0.43 Released
The Apache Software Foundation and The Apache Server Project are
pleased to announce the sixth public release of the Apache 2.0
HTTP Server. This Announcement notes the significant changes in
2.0.43, as compared to 2.0.42.
This version of Apache is principally a security and bug fix release.
A summary of the bug fixes is given at the end of this document.
Of particular note is that 2.0.43 addresses and fixes two security
vulnerabilities.
CAN-2002-0840 (cve.mitre.org)[1]: Apache is susceptible to a cross site
scripting vulnerability in the default 404 page of any web server hosted
on a domain that allows wildcard DNS lookups. We thank Matthew Murphy
for notification of this issue.
Bug ID 13025[2]: Apache would serve script source code for POST requests
when the DAV On directive enabled mod_dav for a given resource. We thank
Sander Holthaus for notification of this issue.
We consider this release to be the best version of Apache available
and encourage users of all prior versions to upgrade.
Apache 2.0.43 is available for download from
http://www.apache.org/dist/httpd/
Please see the CHANGES_2.0 file in the same directory for a full list
of changes.
Binary distributions are available from
http://www.apache.org/dist/httpd/binaries/
The source and binary distributions are also available via any of the
mirrors listed at
http://www.apache.org/mirrors/
Apache 2.0 offers numerous enhancements, improvements, and performance
boosts over the 1.3 codebase. The most visible and noteworthy addition
is the ability to run Apache in a hybrid thread/process mode on any
platform that supports both threads and processes. This has been shown
to improve the scalability of the Apache HTTP Server significantly in
our testing. Apache 2.0 also includes support for filtered I/O. This
allows modules to modify the output of other modules before it is
sent to the client. We have also included support for IPv6 on any
platform that supports IPv6.
For an overview of new features introduced after 1.3 please see
http://httpd.apache.org/docs-2.0/new_features_2_0.html
This version of Apache is known to work on many versions of Unix, BeOS,
OS/2, Windows, and Netware. Because of the many advances in Apache
2.0, it is expected to perform equally well on all supported platforms.
Apache 2.0 has been running on the apache.org website since December
of 2000 and has proven to be very reliable.
When upgrading or installing this version of Apache, please keep
in mind the following:
This release is binary-compatible only with 2.0.42, and no other previous
releases. All modules must be recompiled in order to work with this
version. For example, a module compiled to work with 2.0.40 will not
work with 2.0.43.
This release does not include the new mod_logio, contrary to the
documentation in the CHANGES and manual included in this release.
That module will be included in the next public release of Apache 2.0.
We regret the confusion.
Users of this release on Darwin 6.1 (including Mac OS X 10.2, a.k.a.
"Jaguar") must add --disable-ipv6 when invoking the ./configure script,
to avoid a potential security exposure related to IPv6 support on that
platform.
If you intend to use Apache with one of the threaded MPMs, you must
ensure that the modules (and the libraries they depend on) that you
will be using are thread-safe. Please contact the vendors of
these modules to obtain this information.
IMPORTANT NOTE FOR APACHE USERS: Apache 2.0 has been structured for
multiple operating systems from its inception, by introducing the
Apache Portability Library and MPM modules. Users on non-Unix platforms
are strongly encouraged to move up to Apache 2.0 for better performance,
stability and security on their platforms.
Apache is the most popular web server in the known universe; over half
of the servers on the Internet are running Apache or one of its
variants.
Apache 2.0.43 Major changes
Security vulnerabilities closed since Apache 2.0.42
* Fixed the security vulnerability noted in CAN-2002-0840 (cvs.mitre.org)
regarding a cross-site scripting vulnerability in the default error
page when using wildcard DNS.
* Prevent POST requests for CGI scripts from serving the source code
when DAV is enabled on the location.
Bugs fixed since Apache 2.0.42
* Fixed a core dump in mod_cache when it attemtped to store uncopyable
buckets, such as a file containing SSI tags to execute a CGI script.
* Ensured that output already available is flushed to the network
to help some streaming CGIs and other dynamically-generated content.
* Fixed a mutex problem in mod_ssl dbm session cache support.
* Allow the UserDir directive to accept a list of directories, as in 1.3.
* Changed SuExec to use the same default directory as the rest of the
server, e.g. /usr/local/apache2.
* Retry connections with mod_auth_ldap on LDAP_SERVER_DOWN errors.
* Pass the WWW-Authenticate header on a 4xx responses from the proxy.
* Fixed mod_cache's CacheMaxStreamingBuffer directive within virtual hosts.
* Add -p option to apxs to allow programs to be compiled with apxs.
References
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840
[2] http://nagoya.apache.org/bugzilla/show_bug.cgi?id=13025
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
iQEVAwUBPZyb6vcTqHkQ/eB1AQFzyAf/UUBJ8hWMVn8PPkN+f3Qs6l2Tjc+srufM
rqK74jvnYdb+aYxTYTyqsVtRqX63dOx1f69r2LPxCCMTcyzTQGFIu6r0Z3P/6Oin
OMtW3L4jt39OMd3j0Qp2/WSqUQrGu55IrJL2G19wpceaD4p3RZxlQ6r01UXbx+1q
PE79KgTxcAQT0+xwCJUQcQV5ZNzSjYjC5ssFtvQDYDa9smqCC1xdCVyToemQ5Sfg
SYpaGKMWdnBUkZC/Uy/U6rw+acEB/Ji2kXoML4EuSI7NobH3kzCKfDRIC3+f7N4i
o+/1st6xbrnv8U7lZD2LnXjwAa38TyFuF8jVmsX66uYZ6S+6s9sBhA==
=yChy
-----END PGP SIGNATURE-----