diff options
author | bsiegert <bsiegert> | 2017-02-03 11:26:04 +0000 |
---|---|---|
committer | bsiegert <bsiegert> | 2017-02-03 11:26:04 +0000 |
commit | 5ae9bef27de44da95a43155c6dad70f43e9229d2 (patch) | |
tree | 937d5931c1ee8e2ee8f6892827c472a3dfaa25a9 /www/apache22/patches/patch-server_util__script.c | |
parent | 1e170524d9c72cd7e4dacaa79d948f952aa8dc4b (diff) | |
download | pkgsrc-5ae9bef27de44da95a43155c6dad70f43e9229d2.tar.gz |
Pullup ticket #5204 - requested by sevan
www/apache2: security fix
Revisions pulled up:
- www/apache22/Makefile 1.111
- www/apache22/distinfo 1.66
- www/apache22/patches/patch-include_ap_mmn.h deleted
- www/apache22/patches/patch-modules_proxy_mod_proxy.c deleted
- www/apache22/patches/patch-modules_proxy_mod_proxy.h deleted
- www/apache22/patches/patch-modules_proxy_proxy_util.c deleted
- www/apache22/patches/patch-server_util__script.c deleted
---
Module Name: pkgsrc
Committed By: adam
Date: Mon Jan 16 14:34:42 UTC 2017
Modified Files:
pkgsrc/www/apache22: Makefile distinfo
Removed Files:
pkgsrc/www/apache22/patches: patch-include_ap_mmn.h
patch-modules_proxy_mod_proxy.c patch-modules_proxy_mod_proxy.h
patch-modules_proxy_proxy_util.c patch-server_util__script.c
Log Message:
Changes with Apache 2.2.32
*) SECURITY: CVE-2016-8743 (cve.mitre.org)
Enforce HTTP request grammar corresponding to RFC7230 for request lines
and request headers, to prevent response splitting and cache pollution by
malicious clients or downstream proxies.
*) Validate HTTP response header grammar defined by RFC7230, resulting
in a 500 error in the event that invalid response header contents are
detected when serving the response, to avoid response splitting and cache
pollution by malicious clients, upstream servers or faulty modules.
*) core: Mitigate [f]cgi CVE-2016-5387 "httpoxy" issues.
*) core: Avoid a possible truncation of the faulty header included in the
HTML response when LimitRequestFieldSize is reached.
*) core: Enforce LimitRequestFieldSize after multiple headers with the same
name have been merged.
*) core: Drop Content-Length header and message-body from HTTP 204 responses.
*) core: Permit unencoded ';' characters to appear in proxy requests and
Location: response headers. Corresponds to modern browser behavior.
*) core: ap_rgetline_core now pulls from r->proto_input_filters.
*) core: Correctly parse an IPv6 literal host specification in an absolute
URL in the request line.
*) core: New directive RegisterHttpMethod for registering non-standard
HTTP methods.
*) core: Limit to ten the number of tolerated empty lines between request.
*) core: reject NULLs in request line or request headers.
*) mod_proxy: Use the correct server name for SNI in case the backend
SSL connection itself is established via a proxy server.
*) Fix potential rejection of valid MaxMemFree and ThreadStackSize
directives.
*) mod_ssl: Support compilation against libssl built with OPENSSL_NO_SSL3.
*) mod_proxy: Correctly consider error response codes by the backend when
processing failonstatus.
*) mod_proxy: Play/restore the TLS-SNI on new backend connections which
had to be issued because the remote closed the previous/reusable one
during idle (keep-alive) time.
*) mod_ssl: Fix a possible memory leak on restart for custom [EC]DH params.
*) mod_proxy: Fix a regression with 2.2.31 that caused inherited workers to
use a different scoreboard slot then the original one.
*) mod_proxy: Fix a race condition that caused a failed worker to be retried
before the retry period is over.
*) mod_proxy: don't recyle backend announced "Connection: close" connections
to avoid reusing it should the close be effective after some new request
is ready to be sent.
*) mod_mem_cache: Fix concurrent removal of stale entries which could lead
to a crash.
*) mime.types: add common extension "m4a" for MPEG 4 Audio.
*) mod_substitute: Allow to configure the patterns merge order with the new
SubstituteInheritBefore on|off directive.
*) mod_mem_cache: Don't cache incomplete responses when the client
connection is aborted before the body is fully read.
*) abs: Include OPENSSL_Applink when compiling on Windows, to resolve
failures under Visual Studio 2015 and other mismatched MSVCRT flavors.
*) core: Support custom ErrorDocuments for HTTP 501 and 414 status codes.
Diffstat (limited to 'www/apache22/patches/patch-server_util__script.c')
-rw-r--r-- | www/apache22/patches/patch-server_util__script.c | 22 |
1 files changed, 0 insertions, 22 deletions
diff --git a/www/apache22/patches/patch-server_util__script.c b/www/apache22/patches/patch-server_util__script.c deleted file mode 100644 index a706d1cc909..00000000000 --- a/www/apache22/patches/patch-server_util__script.c +++ /dev/null @@ -1,22 +0,0 @@ -$NetBSD: patch-server_util__script.c,v 1.1 2016/07/29 11:10:24 wiz Exp $ - -Fix httpoxy vulnerability. -https://www.apache.org/security/asf-httpoxy-response.txt - ---- server/util_script.c.orig 2012-08-21 17:42:49.000000000 +0000 -+++ server/util_script.c -@@ -165,6 +165,14 @@ AP_DECLARE(void) ap_add_common_vars(requ - else if (!strcasecmp(hdrs[i].key, "Content-length")) { - apr_table_addn(e, "CONTENT_LENGTH", hdrs[i].val); - } -+ /* HTTP_PROXY collides with a popular envvar used to configure -+ * proxies, don't let clients set/override it. But, if you must... -+ */ -+#ifndef SECURITY_HOLE_PASS_PROXY -+ else if (!strcasecmp(hdrs[i].key, "Proxy")) { -+ ; -+ } -+#endif - /* - * You really don't want to disable this check, since it leaves you - * wide open to CGIs stealing passwords and people viewing them |