summaryrefslogtreecommitdiff
path: root/www/apache2
diff options
context:
space:
mode:
authortaca <taca@pkgsrc.org>2004-06-05 16:21:44 +0000
committertaca <taca@pkgsrc.org>2004-06-05 16:21:44 +0000
commitff26b9ca997a0452777c4b45773eca5045770d72 (patch)
treefad5c68a090e57bc4363aecb2aac162607192b06 /www/apache2
parent42e1bc9d6ecfc1c5e9f2c5b41151a68c1ddf82b2 (diff)
downloadpkgsrc-ff26b9ca997a0452777c4b45773eca5045770d72.tar.gz
Add patch from apache's CVS to fix SSL_Util_UUEncode_Binaty stack buffer
overflow vulnerability. http://www.securityfocus.com/bid/10355 Bump package revision.
Diffstat (limited to 'www/apache2')
-rw-r--r--www/apache2/Makefile4
-rw-r--r--www/apache2/distinfo3
-rw-r--r--www/apache2/patches/patch-as35
3 files changed, 39 insertions, 3 deletions
diff --git a/www/apache2/Makefile b/www/apache2/Makefile
index aa5efc84eb6..f3d9f52dd18 100644
--- a/www/apache2/Makefile
+++ b/www/apache2/Makefile
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.35 2004/03/26 02:27:56 wiz Exp $
+# $NetBSD: Makefile,v 1.36 2004/06/05 16:21:44 taca Exp $
PKGNAME= apache-${APACHE_VERSION}
-PKGREVISION= 1
+PKGREVISION= 2
CATEGORIES= www
HOMEPAGE= http://httpd.apache.org/
diff --git a/www/apache2/distinfo b/www/apache2/distinfo
index 6a84c6204ee..1b524f28f91 100644
--- a/www/apache2/distinfo
+++ b/www/apache2/distinfo
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.24 2004/03/22 19:50:16 reed Exp $
+$NetBSD: distinfo,v 1.25 2004/06/05 16:21:44 taca Exp $
SHA1 (httpd-2.0.49.tar.gz) = 7fe1f9bc835b91d5e55aa39a792b0050a634485b
Size (httpd-2.0.49.tar.gz) = 5919279 bytes
@@ -10,3 +10,4 @@ SHA1 (patch-ak) = f11a86b1235d5c595fa381bbb474db4fe8448215
SHA1 (patch-al) = 29cc52616c50b7ec998339cca386112a8f1611cc
SHA1 (patch-am) = ff60a7b69ad949363ebec194141e9b95cb796426
SHA1 (patch-ar) = de5f57dd0757b7fdc1039c00f6e18de72007f5d8
+SHA1 (patch-as) = 9cdb5eaa3d49728c4139ecf7a628772328bc8a55
diff --git a/www/apache2/patches/patch-as b/www/apache2/patches/patch-as
new file mode 100644
index 00000000000..68153daf2ce
--- /dev/null
+++ b/www/apache2/patches/patch-as
@@ -0,0 +1,35 @@
+$NetBSD: patch-as,v 1.1 2004/06/05 16:21:44 taca Exp $
+
+--- modules/ssl/ssl_engine_kernel.c.orig 2004-02-10 05:53:20.000000000 +0900
++++ modules/ssl/ssl_engine_kernel.c
+@@ -793,7 +793,6 @@ int ssl_hook_UserCheck(request_rec *r)
+ SSLConnRec *sslconn = myConnConfig(r->connection);
+ SSLSrvConfigRec *sc = mySrvConfig(r->server);
+ SSLDirConfigRec *dc = myDirConfig(r);
+- char buf1[MAX_STRING_LEN], buf2[MAX_STRING_LEN];
+ char *clientdn;
+ const char *auth_line, *username, *password;
+
+@@ -872,14 +871,16 @@ int ssl_hook_UserCheck(request_rec *r)
+ * adding the string "xxj31ZMTZzkVA" as the password in the user file.
+ * This is just the crypted variant of the word "password" ;-)
+ */
+- apr_snprintf(buf1, sizeof(buf1), "%s:password", clientdn);
+- ssl_util_uuencode(buf2, buf1, FALSE);
+-
+- apr_snprintf(buf1, sizeof(buf1), "Basic %s", buf2);
+- apr_table_set(r->headers_in, "Authorization", buf1);
++ auth_line = apr_pstrcat(r->pool, "Basic ",
++ ap_pbase64encode(r->pool,
++ apr_pstrcat(r->pool, clientdn,
++ ":password", NULL)),
++ NULL);
++ apr_table_set(r->headers_in, "Authorization", auth_line);
+
+ ap_log_error(APLOG_MARK, APLOG_INFO, 0, r->server,
+- "Faking HTTP Basic Auth header: \"Authorization: %s\"", buf1);
++ "Faking HTTP Basic Auth header: \"Authorization: %s\"",
++ auth_line);
+
+ return DECLINED;
+ }