summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorspz <spz>2010-06-12 20:57:46 +0000
committerspz <spz>2010-06-12 20:57:46 +0000
commit778f3dce4f5ef4eb99f9af7d90eb3ca7c54e62d5 (patch)
tree26d2f50fae757dafa8b95090c0c4e35c012083b6
parent5d21710a521bbbe13a467e9274721897555a6aa7 (diff)
downloadpkgsrc-778f3dce4f5ef4eb99f9af7d90eb3ca7c54e62d5.tar.gz
Pullup ticket 3145 - requested by tron
security fix Revisions pulled up: - pkgsrc/www/apache22/Makefile 1.59 - pkgsrc/www/apache22/distinfo 1.33 - pkgsrc/www/apache22/patches/patch-af 1.3 ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Sat Jun 12 10:40:27 UTC 2010 Modified Files: pkgsrc/www/apache22: Makefile distinfo Added Files: pkgsrc/www/apache22/patches: patch-af Log Message: Add patch provided by the Apache foundation to close the privacy leak reported in CVE-2010-2068. To generate a diff of this commit: cvs rdiff -u -r1.58 -r1.59 pkgsrc/www/apache22/Makefile cvs rdiff -u -r1.32 -r1.33 pkgsrc/www/apache22/distinfo cvs rdiff -u -r0 -r1.3 pkgsrc/www/apache22/patches/patch-af
-rw-r--r--www/apache22/Makefile3
-rw-r--r--www/apache22/distinfo3
-rw-r--r--www/apache22/patches/patch-af35
3 files changed, 39 insertions, 2 deletions
diff --git a/www/apache22/Makefile b/www/apache22/Makefile
index 793043a627c..1877f3e1bba 100644
--- a/www/apache22/Makefile
+++ b/www/apache22/Makefile
@@ -1,6 +1,7 @@
-# $NetBSD: Makefile,v 1.56 2010/03/09 02:30:15 taca Exp $
+# $NetBSD: Makefile,v 1.56.2.1 2010/06/12 20:57:46 spz Exp $
DISTNAME= httpd-2.2.15
+PKGREVISION= 3
PKGNAME= ${DISTNAME:S/httpd/apache/}
CATEGORIES= www
MASTER_SITES= ${MASTER_SITE_APACHE:=httpd/} \
diff --git a/www/apache22/distinfo b/www/apache22/distinfo
index 9656df1c3d2..6da6027a95b 100644
--- a/www/apache22/distinfo
+++ b/www/apache22/distinfo
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.31 2010/03/09 02:30:15 taca Exp $
+$NetBSD: distinfo,v 1.31.2.1 2010/06/12 20:57:46 spz Exp $
SHA1 (httpd-2.2.15.tar.bz2) = 5f0e973839ed2e38a4d03adba109ef5ce3381bc2
RMD160 (httpd-2.2.15.tar.bz2) = e5c5da1fdf86a6b0501f6c8e97ccb1982e81cfdf
@@ -8,6 +8,7 @@ SHA1 (patch-ab) = 365cc3b0ac2d9d68ccb94f5699fe168a1c9b0150
SHA1 (patch-ac) = 515043b5c215d49fe8f6d3191b502c978e2a2dad
SHA1 (patch-ad) = 088d6ff0e7a8acfe70b4f85a6ce58d42c935fd13
SHA1 (patch-ae) = 86b307d6eefef232b6223afc3f69e64be40bd913
+SHA1 (patch-af) = c3051544406326297161f36ff3f499395630dc05
SHA1 (patch-ag) = 78dcb023f524ef65928b529320932c9664ec0d01
SHA1 (patch-ai) = 4ebc3bd580a298973928eb6d13d2ce745eac0312
SHA1 (patch-al) = 56b9f5c2f6fd01fe5067f9210e328cbf674c68f1
diff --git a/www/apache22/patches/patch-af b/www/apache22/patches/patch-af
new file mode 100644
index 00000000000..4fc90dd5ffa
--- /dev/null
+++ b/www/apache22/patches/patch-af
@@ -0,0 +1,35 @@
+$NetBSD: patch-af,v 1.3.2.2 2010/06/12 20:57:46 spz Exp $
+
+Patch to fix CVE-2010-2068, taken from here:
+
+http://www.apache.org/dist/httpd/patches/apply_to_2.2.15/CVE-2010-2068-r953616.patch
+
+--- modules/proxy/mod_proxy_http.c.orig 2010-02-27 18:49:36.000000000 +0000
++++ modules/proxy/mod_proxy_http.c 2010-06-12 11:33:45.000000000 +0100
+@@ -1401,7 +1401,7 @@
+ ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r,
+ "proxy: error reading status line from remote "
+ "server %s", backend->hostname);
+- if (rc == APR_TIMEUP) {
++ if (APR_STATUS_IS_TIMEUP(rc)) {
+ ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+ "proxy: read timeout");
+ }
+@@ -1417,7 +1417,7 @@
+ * we normally would handle timeouts
+ */
+ if (r->proxyreq == PROXYREQ_REVERSE && c->keepalives &&
+- rc != APR_TIMEUP) {
++ !APR_STATUS_IS_TIMEUP(rc)) {
+ apr_bucket *eos;
+
+ ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
+@@ -1449,6 +1449,8 @@
+ APR_BUCKET_INSERT_BEFORE(eos, e);
+ }
+ ap_pass_brigade(r->output_filters, bb);
++ /* Mark the backend connection for closing */
++ backend->close = 1;
+ /* Need to return OK to avoid sending an error message */
+ return OK;
+ }