People of WordPress feature on Hauwa Abashiya, a project manager in UK and Nigeria, and her enthusiasm for open source.
Archive for February, 2023
In the February 2023 survey we received responses from 1,127,630,293 sites across 270,727,775 unique domains, and 12,142,793 web-facing computers. This reflects a loss of 4,638,508 sites, 240,148 domains and 13,907 computers.
OpenResty had the largest percentage growth in sites this month: it is now used by 95,176,082 sites, an increase of 2,884,258 (+3.13%) since last month. This brings its share of sites to 8.44%, up from 8.15% (+0.29pp). OpenResty’s market share by domain count remained stable, with a slight 0.01pp increase this month – its small loss of 14,039 domains was counteracted by the greater loss of domains across all vendors this month.
Cloudflare continues to grow, gaining 1,669,867 sites (+1.49%) and 500,432 domains (+1.89%) since our January survey. Following Cloudflare becoming the most commonly used web server vendor within the top million sites last month, it has started to cement its position: gaining 672 sites (+0.31%) of the top million sites this month, giving it a 21.71% market share (+0.07pp).
Meanwhile, Apache lost 626 sites (-0.29%) in the top million sites, bringing its share to 21.34% (-0.06pp). Outside of the top million, Apache saw more significant losses, netting a decrease of 2,593,754 sites (-1.11%) and 434,071 domains (-0.74%).
Similarly to Apache, nginx lost a significant number of domains this month, being down by 483,620 domains since our January survey (-0.66%). However, nginx maintained its overall site count and even gained 219 of the top million busiest sites, giving it a 21.23% share (+0.02pp) within the top million sites.
The largest loss in sites for a major vendor this month comes from Microsoft, which is down 2,866,173 sites (-9.59%) and 74,094 domains (-0.98%). This continues its consistent downwards trend since December 2018.
Vendor News
- Apache 2.4.55 was released on 17th January 2023. This includes a fix for the CVE-2022-36760 vulnerability. This vulnerability affects configurations using
mod_proxy_ajp
, a proxy server which forwards requests to an application server using the Apache JServ Protocol (AJP). The vulnerability allowed attackers to smuggle requests to the backend AJP server without being correctly processed by the proxy server. - AWS announced general availability of its Asia Pacific (Melbourne) region, as well as general availability of Local Zones in Perth and Santiago.
- Microsoft released Azure Load Testing, a service that can test a web application’s resilience to high load.
Developer | January 2023 | Percent | February 2023 | Percent | Change |
---|---|---|---|---|---|
nginx | 295,678,304 | 26.11% | 295,723,793 | 26.23% | 0.11 |
Apache | 233,636,177 | 20.63% | 231,042,423 | 20.49% | -0.15 |
Cloudflare | 112,159,331 | 9.91% | 113,829,198 | 10.09% | 0.19 |
OpenResty | 92,291,824 | 8.15% | 95,176,082 | 8.44% | 0.29 |
RedHat: RHSA-2023-1014:01 Important: Red Hat OpenStack Platform 17.0 (etcd)
An update for etcd is now available for Red Hat OpenStack Platform 17.0 (Wallaby). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
RedHat: RHSA-2023-1008:01 Important: kpatch-patch security update
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability
RedHat: RHSA-2023-1018:01 Important: Red Hat OpenStack Platform 17.0
An update for python-werkzeug is now available for Red Hat OpenStack Platform 17.0 (Wallaby). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
Ubuntu 5903-1: lighttpd vulnerabilities
Several security issues were fixed in lighttpd.
USN-5821-1 caused a regression in pip.
RedHat: RHSA-2023-0945:01 Important: kpatch-patch security update
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
RedHat: RHSA-2023-0895:01 Moderate: OpenShift Container Platform 4.11.29
Red Hat OpenShift Container Platform release 4.11.29 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
– fix HTTP multi-header compression denial of service (CVE-2023-23916)
Debian: DSA-5365-1: curl security update
Patrick Monnerat discovered that Curl’s support for “chained” HTTP compression algorithms was susceptible to denial of service. For the stable distribution (bullseye), this problem has been fixed in
Ubuntu 5895-1: MPlayer vulnerabilities
Several security issues were fixed in MPlayer.
Several security issues were fixed in Rack.
WP Briefing: Episode 50: 3 Interesting Trends from WordCamp Asia
Join Josepha as she discusses her top 3 takeaways from the first-ever WordCamp Asia in Bangkok!
RedHat: RHSA-2023-0918:01 Moderate: Service Binding Operator security update
An update for service-binding-operator-bundle-container and service-binding-operator-container is now available for OpenShift Developer Tools and Services for OCP 4.9. Red Hat Product Security has rated this update as having a security impact
New upstream version, including fix for CVE-2023-26081
Debian: DSA-5364-1: apr-util security update
Ronald Crane discovered that missing input saniting in the apr_base64 functions of apr-util, the Apache Portable Runtime utility library, may result in denial of service or potentially the execution of arbitrary code.
Security fix for CVE-2023-0056, CVE-2023-25725
Security fix for CVE-2023-0778 —- remove quadlet package specification completely —- bump to v4.4.0
Security fix for CVE-2023-0056, CVE-2023-25725
Debian: DSA-5363-1: php7.4 security update
Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in denial of service or incorrect validation of BCrypt hashes.
Debian: DSA-5362-1: frr security update
An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
Debian: DSA-5361-1: tiff security update
Several flaws were found in tiffcrop, a program distributed by tiff, the Tag Image File Format (TIFF) library and tools. A specially crafted tiff file can lead to an out-of-bounds write or read resulting in a denial of service.
Fedora 36: qt5-qtbase 2023-54a88e1ae4
Fix a possible DOS involving the Qt SQL ODBC driver plugin.
Debian: DSA-5360-1: emacs security update
Xi Lu discovered that missing input sanitising in Emacs (in etags, the Ruby mode and htmlfontify) could result in the execution of arbitrary shell commands.
Debian: DSA-5359-1: chromium security update
Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
Ubuntu 5884-1: Linux kernel (AWS) vulnerabilities
Several security issues were fixed in the Linux kernel.
Debian: DSA-5358-1: asterisk security update
Multiple security vulnerabilities have been discovered in Asterisk, an Open Source Private Branch Exchange. Buffer overflows and other programming errors could be exploited for launching a denial of service attack or the execution of arbitrary code.
Several security issues were fixed in DCMTK.
Debian: DSA-5357-1: git security update
Brief introduction CVE-2023-22490