Author |
|
DjiXas
Joined: 10 Jun 2008 Posts: 11
|
Posted: Tue 06 Jul '10 10:43 Post subject: 2.2.16 status? |
|
|
Hi,
Does anyone know, whether 2.2.16 will be released this month or not? |
|
Back to top |
|
glsmith Moderator
Joined: 16 Oct 2007 Posts: 2268 Location: Sun Diego, USA
|
Posted: Tue 06 Jul '10 10:57 Post subject: |
|
|
Doubt it. Any particular reason? |
|
Back to top |
|
DjiXas
Joined: 10 Jun 2008 Posts: 11
|
|
Back to top |
|
glsmith Moderator
Joined: 16 Oct 2007 Posts: 2268 Location: Sun Diego, USA
|
|
Back to top |
|
DjiXas
Joined: 10 Jun 2008 Posts: 11
|
Posted: Wed 07 Jul '10 20:21 Post subject: |
|
|
Call me an idiot, but I prefer to wait :-)
Thanks, though. |
|
Back to top |
|
glsmith Moderator
Joined: 16 Oct 2007 Posts: 2268 Location: Sun Diego, USA
|
Posted: Thu 08 Jul '10 0:46 Post subject: |
|
|
I wouldn't do that, you have your reasons regardless of my opinion. If you do not use mod_proxy_http, there is no need at this point to even update that module with the CVE fix. If you are running *nix, chances are it has already been fixed and pushed in an update a few weeks ago.
I would like to point out however that this "is" an official release, just in the form of the fixed module instead of an entire server package. The only two changes to this module to date are in there.
There have not been enough other changes to call for a full release, there have only been two others, none of which to the core.
*) mod_ssl: Fix segfault at startup if proxy client certs are shared
across multiple vhosts. PR 39915. [Joe Orton]
*) apxs: Fix -A and -a options to ignore whitespace in httpd.conf
[Philip M. Gollucci]
There are 4 more accepted to backport from trunk soon to be included, none of which to the core. There are 13 more proposed with 0 - 2 votes (requires 3), only 2 require changes to core. None of these possible 17 are vulnerability related changes.
The gears move much slower in the summer, so unless a CVE comes down the road that requires a change to the core, you are probably going to be waiting awhile.
References:
http://httpd.apache.org/security/vulnerabilities_22.html
http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/CHANGES?view=co
http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/STATUS?view=co |
|
Back to top |
|
James Blond Moderator
Joined: 19 Jan 2006 Posts: 7371 Location: Germany, Next to Hamburg
|
|
Back to top |
|
DjiXas
Joined: 10 Jun 2008 Posts: 11
|
Posted: Tue 13 Jul '10 11:58 Post subject: |
|
|
Thanks for the insight, guys! |
|
Back to top |
|