From: "Paul Smedley" Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.4.10) with ESMTP id 12921466 for ecs-isp@2rosenthals.com; Sat, 26 Apr 2025 20:19:30 -0400 Received: from secmgr-va.2rosenthals.com ([50.73.8.217]:48934 helo=mail2.2rosenthals.com) by mail.2rosenthals.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.97.1) (envelope-from ) id 1u8pjs-000000005qy-1o4r for ecs-isp@2rosenthals.com; Sat, 26 Apr 2025 20:19:21 -0400 Received: from vps.smedley.id.au ([142.171.106.2]:57522) by mail2.2rosenthals.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.97.1) (envelope-from ) id 1u8pji-000000004c4-0cP5 for ecs-isp@2rosenthals.com; Sat, 26 Apr 2025 20:19:11 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=smedley.id.au; s=default; t=1745713148; bh=spiDyb1i7WeUXWsIn9IOU445g5yVDVsCs1vdKSvfICY=; h=Date:Subject:References:To:From:In-Reply-To:From; b=FjjV/FEAPQSTmpNK4X8Ey8JT+Tvfrxh9ZKDkNU5CGP2/ukih0z89IJaJvAuP67E46 MDEnE1NVMbYqAYq8u2Z64K8NOZHGJQZ/Y4eDeeOEwDB7EF5gGRMyRpq9E4bvrAWUCC jsb0mJSC+KNNmy0t6Fd1hcyp446SfGBeLWuXtDSk= Received: from [IPV6:2400:a848:4041:0:3e92:6def:3fd:2424] (unknown [IPv6:2400:a848:4041:0:3e92:6def:3fd:2424]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (prime256v1) server-digest SHA256) (No client certificate requested) by vps.smedley.id.au (Postfix) with ESMTPSA id 1276F2015B; Sun, 27 Apr 2025 09:49:07 +0930 (ACST) Content-Type: multipart/alternative; boundary="------------pMVH31zRdLchymKE1UKFlD0C" Message-ID: Date: Sun, 27 Apr 2025 09:49:01 +0930 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Fwd: [ANNOUNCEMENT] Apache HTTP Server 2.4.63 Released References: <1737665721.RAG0TLBZ@httpd.apache.org> Content-Language: en-AU To: eCS ISP Mailing List , Apache HTTP Server for OS/2 In-Reply-To: <1737665721.RAG0TLBZ@httpd.apache.org> X-Forwarded-Message-Id: <1737665721.RAG0TLBZ@httpd.apache.org> This is a multi-part message in MIME format. --------------pMVH31zRdLchymKE1UKFlD0C Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Hey all, Not very tested..... but https://smedley.id.au/tmp/httpd-2.4.63-os2-debug-20250427.zip needs openssl 3.4 from netlabs-exp and possible some other dependencies. Built with GCC 15.1.0 and on my bare metal machine (first apache2 build on this box). Not (yet) tested with PHP... Cheers, Paul -------- Forwarded Message -------- Subject: [ANNOUNCEMENT] Apache HTTP Server 2.4.63 Released Date: Thu, 23 Jan 2025 15:55:21 -0500 From: jim Reply-To: dev@httpd.apache.org To: announce@httpd.apache.org Apache HTTP Server 2.4.63 Released January 23, 2025 The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.4.63 of the Apache HTTP Server ("Apache"). This version of Apache is our latest GA release of the new generation 2.4.x branch of Apache HTTPD and represents fifteen years of innovation by the project, and is recommended over all previous releases. This release of Apache is a security, feature and bug fix release. We consider this release to be the best version of Apache available, and encourage users of all prior versions to upgrade. Apache HTTP Server 2.4.63 is available for download from: https://httpd.apache.org/download.cgi Apache 2.4 offers numerous enhancements, improvements, and performance boosts over the 2.2 codebase. For an overview of new features introduced since 2.4 please see: https://httpd.apache.org/docs/trunk/new_features_2_4.html Please see the CHANGES_2.4 file, linked from the download page, for a full list of changes. A condensed list, CHANGES_2.4.63 includes only those changes introduced since the prior 2.4 release. A summary of all of the security vulnerabilities addressed in this and earlier releases is available: https://httpd.apache.org/security/vulnerabilities_24.html This release requires the Apache Portable Runtime (APR), minimum version 1.5.x, and APR-Util, minimum version 1.5.x. Some features may require the 1.6.x version of both APR and APR-Util. The APR libraries must be upgraded for all features of httpd to operate correctly. This release builds on and extends the Apache 2.2 API. Modules written for Apache 2.2 will need to be recompiled in order to run with Apache 2.4, and require minimal or no source code changes. https://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING When upgrading or installing this version of Apache, please bear in mind that if you intend to use Apache with one of the threaded MPMs (other than the Prefork MPM), you must ensure that any modules you will be using (and the libraries they depend on) are thread-safe. Please note the 2.2.x branch has now passed the end of life at the Apache HTTP Server project and no further activity will occur including security patches. Users must promptly complete their transitions to this 2.4.x release of httpd to benefit from further bug fixes or new features. -- To unsubscribe from this announcement list, send a mail to from your subscribed address. --------------pMVH31zRdLchymKE1UKFlD0C Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 7bit

Hey all,

Not very tested..... but https://smedley.id.au/tmp/httpd-2.4.63-os2-debug-20250427.zip

needs openssl 3.4 from netlabs-exp and possible some other dependencies.

Built with GCC 15.1.0 and on my bare metal machine (first apache2 build on this box).

Not (yet) tested with PHP...

Cheers,

Paul



-------- Forwarded Message --------
Subject: [ANNOUNCEMENT] Apache HTTP Server 2.4.63 Released
Date: Thu, 23 Jan 2025 15:55:21 -0500
From: jim <jim@apache.org>
Reply-To: dev@httpd.apache.org
To: announce@httpd.apache.org


Apache HTTP Server 2.4.63 Released

January 23, 2025

The Apache Software Foundation and the Apache HTTP Server Project
are pleased to announce the release of version 2.4.63 of the Apache
HTTP Server ("Apache"). This version of Apache is our latest GA
release of the new generation 2.4.x branch of Apache HTTPD and
represents fifteen years of innovation by the project, and is
recommended over all previous releases. This release of Apache is
a security, feature and bug fix release.

We consider this release to be the best version of Apache available, and
encourage users of all prior versions to upgrade.

Apache HTTP Server 2.4.63 is available for download from:

https://httpd.apache.org/download.cgi

Apache 2.4 offers numerous enhancements, improvements, and performance
boosts over the 2.2 codebase. For an overview of new features
introduced since 2.4 please see:

https://httpd.apache.org/docs/trunk/new_features_2_4.html

Please see the CHANGES_2.4 file, linked from the download page, for a
full list of changes. A condensed list, CHANGES_2.4.63 includes only
those changes introduced since the prior 2.4 release. A summary of all of the security vulnerabilities addressed in this and earlier releases is available:

https://httpd.apache.org/security/vulnerabilities_24.html

This release requires the Apache Portable Runtime (APR), minimum
version 1.5.x, and APR-Util, minimum version 1.5.x. Some features may
require the 1.6.x version of both APR and APR-Util. The APR libraries
must be upgraded for all features of httpd to operate correctly.

This release builds on and extends the Apache 2.2 API. Modules written
for Apache 2.2 will need to be recompiled in order to run with Apache
2.4, and require minimal or no source code changes.

https://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING

When upgrading or installing this version of Apache, please bear in mind
that if you intend to use Apache with one of the threaded MPMs (other
than the Prefork MPM), you must ensure that any modules you will be
using (and the libraries they depend on) are thread-safe.

Please note the 2.2.x branch has now passed the end of life at the Apache
HTTP Server project and no further activity will occur including security
patches. Users must promptly complete their transitions to this 2.4.x
release of httpd to benefit from further bug fixes or new features.



--
To unsubscribe from this announcement list, send a mail to
<announce-unsubscribe@httpd.apache.org> from your subscribed address.

--------------pMVH31zRdLchymKE1UKFlD0C--