The NetBSD Project

CVS log for pkgsrc/www/apache24/distinfo

[BACK] Up to [cvs.NetBSD.org] / pkgsrc / www / apache24

Request diff between arbitrary revisions


Default branch: MAIN


Revision 1.40.2.1 / (download) - annotate - [select for diffs], Thu Sep 5 10:21:28 2019 UTC (6 weeks, 1 day ago) by bsiegert
Branch: pkgsrc-2019Q2
Changes since 1.40: +6 -6 lines
Diff to previous 1.40 (colored) next main 1.41 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #6037 - requested by taca
www/apache24: SunOS build fix, security fix

Revisions pulled up:
- www/apache24/Makefile                                         1.82,1.84
- www/apache24/PLIST                                            1.31
- www/apache24/distinfo                                         1.41
- www/apache24/patches/patch-ai                                 1.2

---
   Module Name:	pkgsrc
   Committed By:	ryoon
   Date:		Mon Jul  1 04:08:55 UTC 2019

   Modified Files:

   	pkgsrc/www/apache24: Makefile

   Log Message:
   Recursive revbump from boost-1.70.0

---
   Module Name:	pkgsrc
   Committed By:	jperkin
   Date:		Mon Jul 22 10:34:22 UTC 2019

   Modified Files:
   	pkgsrc/www/apache24: Makefile

   Log Message:
   apache24: Extend SunOS C99 compilers list to gcc-5.

   Should fix PR#54385 from Hiroshi Hakoyama.

---
   Module Name:	pkgsrc
   Committed By:	wiz
   Date:		Sun Aug 11 13:25:21 UTC 2019

   Modified Files:

   	pkgsrc/www/apache24: Makefile buildlink3.mk


   Log Message:
   Bump PKGREVISIONs for perl 5.30.0

---
   Module Name:	pkgsrc
   Committed By:	adam
   Date:		Thu Aug 15 08:03:39 UTC 2019

   Modified Files:
   	pkgsrc/www/apache24: Makefile PLIST distinfo
   	pkgsrc/www/apache24/patches: patch-ai

   Log Message:
   apache24: updated to 2.4.41

   Changes with Apache 2.4.41

     *) SECURITY: CVE-2019-10081 (cve.mitre.org)
        mod_http2: HTTP/2 very early pushes, for example configured with "H2PushResource",
        could lead to an overwrite of memory in the pushing request's pool,
        leading to crashes. The memory copied is that of the configured push
        link header values, not data supplied by the client.

     *) SECURITY: CVE-2019-9517 (cve.mitre.org)
        mod_http2: a malicious client could perform a DoS attack by flooding
        a connection with requests and basically never reading responses
        on the TCP connection. Depending on h2 worker dimensioning, it was
        possible to block those with relatively few connections.

     *) SECURITY: CVE-2019-10098 (cve.mitre.org)
        rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable
        matches and substitutions with encoded line break characters.

     *) SECURITY: CVE-2019-10092 (cve.mitre.org)
        Remove HTML-escaped URLs from canned error responses to prevent misleading
        text/links being displayed via crafted links.

     *) SECURITY: CVE-2019-10097 (cve.mitre.org)
        mod_remoteip: Fix stack buffer overflow and NULL pointer deference
        when reading the PROXY protocol header.

     *) SECURITY: CVE-2019-10082 (cve.mitre.org)
        mod_http2: Using fuzzed network input, the http/2 session
        handling could be made to read memory after being freed,
        during connection shutdown.

     *) mod_proxy_balancer: Improve balancer-manager protection against
        XSS/XSRF attacks from trusted users.

     *) mod_session: Introduce SessionExpiryUpdateInterval which allows to
        configure the session/cookie expiry's update interval.

     *) modules/filters: Fix broken compilation when using old GCC (<4.2.x).

     *) mod_ssl: Fix startup failure in 2.4.40 with SSLCertificateChainFile
        configured for a domain managed by mod_md.

Revision 1.41 / (download) - annotate - [select for diffs], Thu Aug 15 08:03:39 2019 UTC (2 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2019Q3-base, pkgsrc-2019Q3, HEAD
Changes since 1.40: +6 -6 lines
Diff to previous 1.40 (colored) to selected 1.14.2.1 (colored)

apache24: updated to 2.4.41

Changes with Apache 2.4.41

  *) SECURITY: CVE-2019-10081 (cve.mitre.org)
     mod_http2: HTTP/2 very early pushes, for example configured with "H2PushResource",
     could lead to an overwrite of memory in the pushing request's pool,
     leading to crashes. The memory copied is that of the configured push
     link header values, not data supplied by the client.

  *) SECURITY: CVE-2019-9517 (cve.mitre.org)
     mod_http2: a malicious client could perform a DoS attack by flooding
     a connection with requests and basically never reading responses
     on the TCP connection. Depending on h2 worker dimensioning, it was
     possible to block those with relatively few connections.

  *) SECURITY: CVE-2019-10098 (cve.mitre.org)
     rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable
     matches and substitutions with encoded line break characters.

  *) SECURITY: CVE-2019-10092 (cve.mitre.org)
     Remove HTML-escaped URLs from canned error responses to prevent misleading
     text/links being displayed via crafted links.

  *) SECURITY: CVE-2019-10097 (cve.mitre.org)
     mod_remoteip: Fix stack buffer overflow and NULL pointer deference
     when reading the PROXY protocol header.

  *) SECURITY: CVE-2019-10082 (cve.mitre.org)
     mod_http2: Using fuzzed network input, the http/2 session
     handling could be made to read memory after being freed,
     during connection shutdown.

  *) mod_proxy_balancer: Improve balancer-manager protection against
     XSS/XSRF attacks from trusted users.

  *) mod_session: Introduce SessionExpiryUpdateInterval which allows to
     configure the session/cookie expiry's update interval.

  *) modules/filters: Fix broken compilation when using old GCC (<4.2.x).

  *) mod_ssl: Fix startup failure in 2.4.40 with SSLCertificateChainFile
     configured for a domain managed by mod_md.

Revision 1.39.2.1 / (download) - annotate - [select for diffs], Wed Apr 10 09:31:27 2019 UTC (6 months, 1 week ago) by bsiegert
Branch: pkgsrc-2019Q1
Changes since 1.39: +5 -5 lines
Diff to previous 1.39 (colored) next main 1.40 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #5930 - requested by taca
www/apache24: security fix

Revisions pulled up:
- www/apache24/Makefile                                         1.77
- www/apache24/PLIST                                            1.28
- www/apache24/distinfo                                         1.40

---
   Module Name:	pkgsrc
   Committed By:	adam
   Date:		Tue Apr  2 07:25:38 UTC 2019

   Modified Files:
   	pkgsrc/www/apache24: Makefile PLIST distinfo

   Log Message:
   apache24: updated to 2.4.39

   Changes with Apache 2.4.39

   *) mod_proxy/ssl: Cleanup per-request SSL configuration anytime a backend
      connection is recycled/reused to avoid a possible crash with some SSLProxy
      configurations in <Location> or <Proxy> context.

   *) mod_ssl: Correctly restore SSL verify state after TLSv1.3 PHA failure.

   *) mod_log_config: Support %{c}h for conn-hostname, %h for useragent_host

   *) mod_socache_redis: Support for Redis as socache storage provider.

   *) core: new configuration option 'MergeSlashes on|off' that controls handling of
      multiple, consecutive slash ('/') characters in the path component of the request URL.

   *) mod_http2: when SSL renegotiation is inhibited and a 403 ErrorDocument is
      in play, the proper HTTP/2 stream reset did not trigger with H2_ERR_HTTP_1_1_REQUIRED.

   *) mod_http2: new configuration directive: `H2Padding numbits` to control
      padding of HTTP/2 payload frames. 'numbits' is a number from 0-8,
      controlling the range of padding bytes added to a frame. The actual number
      added is chosen randomly per frame. This applies to HEADERS, DATA and PUSH_PROMISE
      frames equally. The default continues to be 0, e.g. no padding.

   *) mod_http2: ripping out all the h2_req_engine internal features now that mod_proxy_http2
      has no more need for it. Optional functions are still declared but no longer implemented.
      While previous mod_proxy_http2 will work with this, it is recommeneded to run the matching
      versions of both modules.

   *) mod_proxy_http2: changed mod_proxy_http2 implementation and fixed several bugs which
      resolve bug 63170. The proxy module does now a single h2 request on the (reused)
      connection and returns.

   *) mod_http2/mod_proxy_http2: proxy_http2 checks correct master connection aborted status
      to trigger immediate shutdown of backend connections. This is now always signalled
      by mod_http2 when the the session is being released.
      proxy_http2 now only sends a PING frame to the backend when there is not already one
      in flight.

   *) mod_proxy_http2: fixed an issue where a proxy_http2 handler entered an infinite
      loop when encountering certain errors on the backend connection.

   *) mod_http2: Configuration directives H2Push and H2Upgrade can now be specified per
      Location/Directory, e.g. disabling PUSH for a specific set of resources.

   *) mod_http2: HEAD requests to some module such as mod_cgid caused the stream to
      terminate improperly and cause a HTTP/2 PROTOCOL_ERROR.

   *) http: Fix possible empty response with mod_ratelimit for HEAD requests.

   *) mod_cache_socache: Avoid reallocations and be safe with outgoing data
      lifetime.

   *) MPMs unix: bind the bucket number of each child to its slot number, for a
      more efficient per bucket maintenance.

   *) mod_auth_digest: Fix a race condition. Authentication with valid
      credentials could be refused in case of concurrent accesses from
      different users.

   *) mod_http2: enable re-use of slave connections again. Fixed slave connection
      keepalives counter.

   *) mod_reqtimeout: Allow to configure (TLS-)handshake timeouts.

   *) mod_proxy_wstunnel: Fix websocket proxy over UDS.

   *) mod_ssl: Don't unset FIPS mode on restart unless it's forced by
      configuration (SSLFIPS on) and not active by default in OpenSSL.

Revision 1.40 / (download) - annotate - [select for diffs], Tue Apr 2 07:25:38 2019 UTC (6 months, 2 weeks ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2019Q2-base
Branch point for: pkgsrc-2019Q2
Changes since 1.39: +5 -5 lines
Diff to previous 1.39 (colored) to selected 1.14.2.1 (colored)

apache24: updated to 2.4.39

Changes with Apache 2.4.39

*) mod_proxy/ssl: Cleanup per-request SSL configuration anytime a backend
   connection is recycled/reused to avoid a possible crash with some SSLProxy
   configurations in <Location> or <Proxy> context.

*) mod_ssl: Correctly restore SSL verify state after TLSv1.3 PHA failure.

*) mod_log_config: Support %{c}h for conn-hostname, %h for useragent_host

*) mod_socache_redis: Support for Redis as socache storage provider.

*) core: new configuration option 'MergeSlashes on|off' that controls handling of
   multiple, consecutive slash ('/') characters in the path component of the request URL.

*) mod_http2: when SSL renegotiation is inhibited and a 403 ErrorDocument is
   in play, the proper HTTP/2 stream reset did not trigger with H2_ERR_HTTP_1_1_REQUIRED.

*) mod_http2: new configuration directive: `H2Padding numbits` to control
   padding of HTTP/2 payload frames. 'numbits' is a number from 0-8,
   controlling the range of padding bytes added to a frame. The actual number
   added is chosen randomly per frame. This applies to HEADERS, DATA and PUSH_PROMISE
   frames equally. The default continues to be 0, e.g. no padding.

*) mod_http2: ripping out all the h2_req_engine internal features now that mod_proxy_http2
   has no more need for it. Optional functions are still declared but no longer implemented.
   While previous mod_proxy_http2 will work with this, it is recommeneded to run the matching
   versions of both modules.

*) mod_proxy_http2: changed mod_proxy_http2 implementation and fixed several bugs which
   resolve bug 63170. The proxy module does now a single h2 request on the (reused)
   connection and returns.

*) mod_http2/mod_proxy_http2: proxy_http2 checks correct master connection aborted status
   to trigger immediate shutdown of backend connections. This is now always signalled
   by mod_http2 when the the session is being released.
   proxy_http2 now only sends a PING frame to the backend when there is not already one
   in flight.

*) mod_proxy_http2: fixed an issue where a proxy_http2 handler entered an infinite
   loop when encountering certain errors on the backend connection.

*) mod_http2: Configuration directives H2Push and H2Upgrade can now be specified per
   Location/Directory, e.g. disabling PUSH for a specific set of resources.

*) mod_http2: HEAD requests to some module such as mod_cgid caused the stream to
   terminate improperly and cause a HTTP/2 PROTOCOL_ERROR.

*) http: Fix possible empty response with mod_ratelimit for HEAD requests.

*) mod_cache_socache: Avoid reallocations and be safe with outgoing data
   lifetime.

*) MPMs unix: bind the bucket number of each child to its slot number, for a
   more efficient per bucket maintenance.

*) mod_auth_digest: Fix a race condition. Authentication with valid
   credentials could be refused in case of concurrent accesses from
   different users.

*) mod_http2: enable re-use of slave connections again. Fixed slave connection
   keepalives counter.

*) mod_reqtimeout: Allow to configure (TLS-)handshake timeouts.

*) mod_proxy_wstunnel: Fix websocket proxy over UDS.

*) mod_ssl: Don't unset FIPS mode on restart unless it's forced by
   configuration (SSLFIPS on) and not active by default in OpenSSL.

Revision 1.38.2.1 / (download) - annotate - [select for diffs], Tue Jan 29 13:58:59 2019 UTC (8 months, 2 weeks ago) by bsiegert
Branch: pkgsrc-2018Q4
Changes since 1.38: +5 -5 lines
Diff to previous 1.38 (colored) next main 1.39 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #5903 - requested by taca
www/apache24: security fix

Revisions pulled up:
- www/apache24/Makefile                                         1.76
- www/apache24/distinfo                                         1.39

---
   Module Name:	pkgsrc
   Committed By:	adam
   Date:		Wed Jan 23 12:04:18 UTC 2019

   Modified Files:
   	pkgsrc/www/apache24: Makefile distinfo

   Log Message:
   apache24: updated to 2.4.38

   Changes with Apache 2.4.38
   *) SECURITY: CVE-2018-17199 (cve.mitre.org)
      mod_session: mod_session_cookie does not respect expiry time allowing
      sessions to be reused.
   *) SECURITY: CVE-2018-17189 (cve.mitre.org)
      mod_http2: fixes a DoS attack vector. By sending slow request bodies
      to resources not consuming them, httpd cleanup code occupies a server
      thread unnecessarily. This was changed to an immediate stream reset
      which discards all stream state and incoming data.
   *) SECURITY: CVE-2019-0190 (cve.mitre.org)
      mod_ssl: Fix infinite loop triggered by a client-initiated
      renegotiation in TLSv1.2 (or earlier) with OpenSSL 1.1.1 and
      later.
   *) mod_ssl: Clear retry flag before aborting client-initiated renegotiation.
   *) mod_negotiation: Treat LanguagePriority as case-insensitive to match
      AddLanguage behavior and HTTP specification.
   *) mod_md: incorrect behaviour when synchronizing ongoing ACME challenges
      have been fixed.
   *) mod_setenvif: We can have expressions that become true if a regex pattern
      in the expression does NOT match. In this case val is NULL
      and we should just set the value for the environment variable
      like in the pattern case.
   *) mod_session: Always decode session attributes early.
   *) core: Incorrect values for environment variables are substituted when
      multiple environment variables are specified in a directive.
   *) mod_rewrite: Only create the global mutex used by "RewriteMap prg:" when
      this type of map is present in the configuration.
   *) mod_dav: Fix invalid Location header when a resource is created by
      passing an absolute URI on the request line
   *) mod_session_cookie: avoid duplicate Set-Cookie header in the response.
   *) mod_ssl: clear *SSL errors before loading certificates and checking
      afterwards. Otherwise errors are reported when other SSL using modules
      are in play.
   *) mod_ssl: Fix the error code returned in an error path of
      'ssl_io_filter_handshake()'. This messes-up error handling performed
      in 'ssl_io_filter_error()'
   *) mod_ssl: Fix $HTTPS definition for "SSLEngine optional" case, and fix
      authz provider so "Require ssl" works correctly in HTTP/2.
   *) mod_proxy: If ProxyPassReverse is used for reverse mapping of relative
      redirects, subsequent ProxyPassReverse statements, whether they are
      relative or absolute, may fail.
   *) mod_lua: Now marked as a stable module

Revision 1.39 / (download) - annotate - [select for diffs], Wed Jan 23 12:04:18 2019 UTC (8 months, 3 weeks ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2019Q1-base
Branch point for: pkgsrc-2019Q1
Changes since 1.38: +5 -5 lines
Diff to previous 1.38 (colored) to selected 1.14.2.1 (colored)

apache24: updated to 2.4.38

Changes with Apache 2.4.38
*) SECURITY: CVE-2018-17199 (cve.mitre.org)
   mod_session: mod_session_cookie does not respect expiry time allowing
   sessions to be reused.
*) SECURITY: CVE-2018-17189 (cve.mitre.org)
   mod_http2: fixes a DoS attack vector. By sending slow request bodies
   to resources not consuming them, httpd cleanup code occupies a server
   thread unnecessarily. This was changed to an immediate stream reset
   which discards all stream state and incoming data.
*) SECURITY: CVE-2019-0190 (cve.mitre.org)
   mod_ssl: Fix infinite loop triggered by a client-initiated
   renegotiation in TLSv1.2 (or earlier) with OpenSSL 1.1.1 and
   later.
*) mod_ssl: Clear retry flag before aborting client-initiated renegotiation.
*) mod_negotiation: Treat LanguagePriority as case-insensitive to match
   AddLanguage behavior and HTTP specification.
*) mod_md: incorrect behaviour when synchronizing ongoing ACME challenges
   have been fixed.
*) mod_setenvif: We can have expressions that become true if a regex pattern
   in the expression does NOT match. In this case val is NULL
   and we should just set the value for the environment variable
   like in the pattern case.
*) mod_session: Always decode session attributes early.
*) core: Incorrect values for environment variables are substituted when
   multiple environment variables are specified in a directive.
*) mod_rewrite: Only create the global mutex used by "RewriteMap prg:" when
   this type of map is present in the configuration.
*) mod_dav: Fix invalid Location header when a resource is created by
   passing an absolute URI on the request line
*) mod_session_cookie: avoid duplicate Set-Cookie header in the response.
*) mod_ssl: clear *SSL errors before loading certificates and checking
   afterwards. Otherwise errors are reported when other SSL using modules
   are in play.
*) mod_ssl: Fix the error code returned in an error path of
   'ssl_io_filter_handshake()'. This messes-up error handling performed
   in 'ssl_io_filter_error()'
*) mod_ssl: Fix $HTTPS definition for "SSLEngine optional" case, and fix
   authz provider so "Require ssl" works correctly in HTTP/2.
*) mod_proxy: If ProxyPassReverse is used for reverse mapping of relative
   redirects, subsequent ProxyPassReverse statements, whether they are
   relative or absolute, may fail.
*) mod_lua: Now marked as a stable module

Revision 1.38 / (download) - annotate - [select for diffs], Wed Oct 24 10:08:00 2018 UTC (11 months, 3 weeks ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2018Q4-base
Branch point for: pkgsrc-2018Q4
Changes since 1.37: +5 -5 lines
Diff to previous 1.37 (colored) to selected 1.14.2.1 (colored)

apache24: updated to 2.4.37

Changes with Apache 2.4.37

  *) mod_ssl: Fix HTTP/2 failures when using OpenSSL 1.1.1.

  *) mod_ssl: Fix crash during SSL renegotiation with OptRenegotiate set,
     when client certificates are available from the original handshake
     but were originally not verified and should get verified now.
     This is a regression in 2.4.36 (unreleased).

  *) mod_ssl: Correctly merge configurations that have client certificates set
     by SSLProxyMachineCertificate{File|Path}.

Changes with Apache 2.4.36

  *) mod_brotli, mod_deflate: Restore the separate handling of 304 Not Modified
     responses. Regression introduced in 2.4.35.

  *) mod_proxy_scgi, mod_proxy_uwsgi: improve error handling when sending the
     body of the response.

  *) mod_http2: adding defensive code for stream EOS handling, in case the request handler
     missed to signal it the normal way (eos buckets).

  *) ab: Add client certificate support.

  *) ab: Disable printing temp key for OpenSSL before
     version 1.0.2. SSL_get_server_tmp_key is not available
     there.

  *) mod_ssl: Fix a regression that the configuration settings for verify mode
     and verify depth were taken from the frontend connection in case of
     connections by the proxy to the backend.

  *) MPMs: Initialize all runtime/asynchronous objects on a dedicated pool and
     before signals handling to avoid lifetime issues on restart or shutdown.

  *) mod_ssl: Add support for OpenSSL 1.1.1 and TLSv1.3.  TLSv1.3 has
     behavioural changes compared to v1.2 and earlier; client and
     configuration changes should be expected.  SSLCipherSuite is
     enhanced for TLSv1.3 ciphers, but applies at vhost level only.

  *) mod_auth_basic: Be less tolerant when parsing the credencial. Only spaces
     should be accepted after the authorization scheme. \t are also tolerated.

  *) mod_proxy_hcheck: Fix issues with interval determination.

  *) mod_proxy_hcheck: Fix issues with TCP health checks.

  *) mod_proxy_hcheck: take balancer's SSLProxy* directives into account.

  *) mod_status, mod_echo: Fix the display of client addresses.
    They were truncated to 31 characters which is not enough for IPv6 addresses.
    This is done by deprecating the use of the 'client' field and using
    the new 'client64' field in worker_score.

Revision 1.37 / (download) - annotate - [select for diffs], Mon Sep 24 07:37:47 2018 UTC (12 months, 3 weeks ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2018Q3-base, pkgsrc-2018Q3
Changes since 1.36: +6 -6 lines
Diff to previous 1.36 (colored) to selected 1.14.2.1 (colored)

apache24: updated to 2.4.35

Changes with Apache 2.4.35

*) http: Enforce consistently no response body with both 204 and 304
   statuses.

*) mod_status: Cumulate CPU time of exited child processes in the
   "cu" and "cs" values. Add CPU time of the parent process to the
   "c" and "s" values.

*) mod_proxy: Improve the balancer member data shown in mod_status when
   "ProxyStatus" is "On": add "busy" count and show byte counts in
   auto mode always in units of kilobytes.

*) mod_status: Add cumulated response duration time in milliseconds.

*) mod_status: Complete the data shown for async MPMs in "auto" mode.
   Added number of processes, number of stopping processes and number
   of busy and idle workers.

*) mod_ratelimit: Don't interfere with "chunked" encoding, fixing regression
   introduced in 2.4.34.

*) mod_proxy: Remove load order and link dependency between mod_lbmethod_*
   modules and mod_proxy.

*) Allow the argument to <IfFile>, <IfDefine>, <IfSection>, <IfDirective>,
   and <IfModule> to be quoted.  This is primarily for the benefit of
   <IfFile>.

*) mod_watchdog: Correct some log messages.

*) mod_md: When the last domain name from an MD is moved to another one,
   that now empty MD gets moved to the store archive.

*) mod_ssl: Fix merging of SSLOCSPOverrideResponder.

*) mod_proxy_balancer: Restore compatibility with APR 1.4.

Revision 1.35.4.1 / (download) - annotate - [select for diffs], Sat Aug 18 09:10:59 2018 UTC (14 months ago) by bsiegert
Branch: pkgsrc-2018Q2
Changes since 1.35: +6 -6 lines
Diff to previous 1.35 (colored) next main 1.36 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #5802 - requested by taca
www/apache24: security fix

Revisions pulled up:
- www/apache24/Makefile                                         1.69-1.70
- www/apache24/distinfo                                         1.36
- www/apache24/patches/patch-aa                                 1.2

---
   Module Name:	pkgsrc
   Committed By:	jperkin
   Date:		Wed Jul  4 13:40:45 UTC 2018

   Modified Files:
   	pkgsrc/www/apache24: Makefile

   Log Message:
   *: Move SUBST_STAGE from post-patch to pre-configure

   Performing substitutions during post-patch breaks tools such as mkpatches,
   making it very difficult to regenerate correct patches after making changes,
   and often leading to substituted string replacements being committed.

---
   Module Name:	pkgsrc
   Committed By:	adam
   Date:		Thu Jul 19 08:53:58 UTC 2018

   Modified Files:
   	pkgsrc/www/apache24: Makefile distinfo
   	pkgsrc/www/apache24/patches: patch-aa

   Log Message:
   apache24: updated to 2.4.34

   Apache 2.4.34
   *) SECURITY: CVE-2018-8011 (cve.mitre.org)
      mod_md: DoS via Coredumps on specially crafted requests
   *) SECURITY: CVE-2018-1333 (cve.mitre.org)
      mod_http2: DoS for HTTP/2 connections by specially crafted requests
   *) Introduce zh-cn and zh-tw (simplified and traditional Chinese) error
      document translations.
   *) event: avoid possible race conditions with modules on the child pool.
   *) mod_proxy: Fix a corner case where the ProxyPassReverseCookieDomain or
      ProxyPassReverseCookiePath directive could fail to update correctly
      'domain=' or 'path=' in the 'Set-Cookie' header.
   *) mod_ratelimit: fix behavior when proxing content.
   *) core: Re-allow '_' (underscore) in hostnames.
   *) mod_authz_core: If several parameters are used in a AuthzProviderAlias
      directive, if these parameters are not enclosed in quotation mark, only
      the first one is handled. The other ones are silently ignored.
      Add a message to warn about such a spurious configuration.
   *) mod_md: improvements and bugfixes
      - MDNotifyCmd now takes additional parameter that are passed on to the called command.
      - ACME challenges have better checks for interference with other modules
      - ACME challenges are only handled for domains managed by the module, allowing
        other ACME clients to operate for other domains in the server.
      - better libressl integration
   *) mod_proxy_wstunnel: Add default schema ports for 'ws' and 'wss'.
   *) logging: Some early logging-related startup messages could be lost
      when using syslog for the global ErrorLog.
   *) mod_cache: Handle case of an invalid Expires header value RFC compliant
      like the case of an Expires time in the past: allow to overwrite the
      non-caching decision using CacheStoreExpired and respect Cache-Control
      "max-age" and "s-maxage".
   *) mod_xml2enc: Fix forwarding of error metadata/responses.
   *) mod_proxy_http: Fix response header thrown away after the previous one
      was considered too large and truncated.
   *) core: Add and handle AP_GETLINE_NOSPC_EOL flag for ap_getline() family
      of functions to consume the end of line when the buffer is exhausted.
   *) mod_proxy_http: Add new worker parameter 'responsefieldsize' to
      allow maximum HTTP response header size to be increased past 8192
      bytes.
   *) mod_ssl: Extend SSLOCSPEnable with mode 'leaf' that only checks the leaf
      of a certificate chain.
   *) http: Fix small memory leak per request when handling persistent
      connections.
   *) mod_proxy_html: Fix variable interpolation and memory allocation failure
      in ProxyHTMLURLMap.
   *) mod_remoteip: Fix RemoteIP{Trusted,Internal}ProxyList loading broken by 2.4.30.
   *) mod_remoteip: When overriding the useragent address from X-Forwarded-For,
      zero out what had been initialized as the connection-level port.
   *) core: In ONE_PROCESS/debug mode, cleanup everything when exiting.
   *) mod_proxy_balancer: Add hot spare member type and corresponding flag (R).
      Hot spare members are used as drop-in replacements for unusable workers
      in the same load balancer set. This differs from hot standbys which are
      only used when all workers in a set are unusable.
   *) suexec: Add --enable-suexec-capabilites support on Linux, to use
      setuid/setgid capability bits rather than a setuid root binary.
   *) suexec: Add support for logging to syslog as an alternative to
      logging to a file; use --without-suexec-logfile --with-suexec-syslog.
   *) mod_ssl: Restore 2.4.29 behaviour in SSL vhost merging/enabling
      which broke some rare but previously-working configs.
   *) core, log: improve sanity checks for the ErrorLog's syslog config, and
      explicitly allow only lowercase 'syslog' settings.
   *) mod_http2: accurate reporting of h2 data input/output per request via
      mod_logio. Fixes an issue where output sizes where counted n-times on
      reused slave connections.
   *) mod_http2: Fix unnecessary timeout waits in case streams are aborted.
   *) mod_http2: restoring the v1.10.16 keepalive timeout behaviour of mod_http2.
   *) mod_proxy: Do not restrict the maximum pool size for backend connections
      any longer by the maximum number of threads per process and use a better
      default if mod_http2 is loaded.
   *) mod_slotmem_shm: Add generation number to shm filename to fix races
      with graceful restarts.
   *) core: Preserve the original HTTP request method in the '%<m' LogFormat
      when an path-based ErrorDocument is used.
   *) mod_remoteip: make proxy-protocol work on slave connections, e.g. in
      HTTP/2 requests.
   *) mod_ssl: Fix merging of proxy SSL context outside <Proxy> sections,
      regression introduced in 2.4.30.
   *) mod_md: Fix compilation with OpenSSL before version 1.0.2.
   *) mod_dumpio: do nothing below log level TRACE7.
   *) mod_remoteip: Restore compatibility with APR 1.4 (apr_sockaddr_is_wildcard).
   *) core: On ECBDIC platforms, some errors related to oversized headers
      may be misreported or be logged as ASCII escapes.
   *) mod_ssl: Fix cmake-based build.
   *) core: Add <IfFile>, <IfDirective> and <IfSection> conditional
      section containers.

Revision 1.36 / (download) - annotate - [select for diffs], Thu Jul 19 08:53:58 2018 UTC (15 months ago) by adam
Branch: MAIN
Changes since 1.35: +6 -6 lines
Diff to previous 1.35 (colored) to selected 1.14.2.1 (colored)

apache24: updated to 2.4.34

Apache 2.4.34
*) SECURITY: CVE-2018-8011 (cve.mitre.org)
   mod_md: DoS via Coredumps on specially crafted requests
*) SECURITY: CVE-2018-1333 (cve.mitre.org)
   mod_http2: DoS for HTTP/2 connections by specially crafted requests
*) Introduce zh-cn and zh-tw (simplified and traditional Chinese) error
   document translations.
*) event: avoid possible race conditions with modules on the child pool.
*) mod_proxy: Fix a corner case where the ProxyPassReverseCookieDomain or
   ProxyPassReverseCookiePath directive could fail to update correctly
   'domain=' or 'path=' in the 'Set-Cookie' header.
*) mod_ratelimit: fix behavior when proxing content.
*) core: Re-allow '_' (underscore) in hostnames.
*) mod_authz_core: If several parameters are used in a AuthzProviderAlias
   directive, if these parameters are not enclosed in quotation mark, only
   the first one is handled. The other ones are silently ignored.
   Add a message to warn about such a spurious configuration.
*) mod_md: improvements and bugfixes
   - MDNotifyCmd now takes additional parameter that are passed on to the called command.
   - ACME challenges have better checks for interference with other modules
   - ACME challenges are only handled for domains managed by the module, allowing
     other ACME clients to operate for other domains in the server.
   - better libressl integration
*) mod_proxy_wstunnel: Add default schema ports for 'ws' and 'wss'.
*) logging: Some early logging-related startup messages could be lost
   when using syslog for the global ErrorLog.
*) mod_cache: Handle case of an invalid Expires header value RFC compliant
   like the case of an Expires time in the past: allow to overwrite the
   non-caching decision using CacheStoreExpired and respect Cache-Control
   "max-age" and "s-maxage".
*) mod_xml2enc: Fix forwarding of error metadata/responses.
*) mod_proxy_http: Fix response header thrown away after the previous one
   was considered too large and truncated.
*) core: Add and handle AP_GETLINE_NOSPC_EOL flag for ap_getline() family
   of functions to consume the end of line when the buffer is exhausted.
*) mod_proxy_http: Add new worker parameter 'responsefieldsize' to
   allow maximum HTTP response header size to be increased past 8192
   bytes.
*) mod_ssl: Extend SSLOCSPEnable with mode 'leaf' that only checks the leaf
   of a certificate chain.
*) http: Fix small memory leak per request when handling persistent
   connections.
*) mod_proxy_html: Fix variable interpolation and memory allocation failure
   in ProxyHTMLURLMap.
*) mod_remoteip: Fix RemoteIP{Trusted,Internal}ProxyList loading broken by 2.4.30.
*) mod_remoteip: When overriding the useragent address from X-Forwarded-For,
   zero out what had been initialized as the connection-level port.
*) core: In ONE_PROCESS/debug mode, cleanup everything when exiting.
*) mod_proxy_balancer: Add hot spare member type and corresponding flag (R).
   Hot spare members are used as drop-in replacements for unusable workers
   in the same load balancer set. This differs from hot standbys which are
   only used when all workers in a set are unusable.
*) suexec: Add --enable-suexec-capabilites support on Linux, to use
   setuid/setgid capability bits rather than a setuid root binary.
*) suexec: Add support for logging to syslog as an alternative to
   logging to a file; use --without-suexec-logfile --with-suexec-syslog.
*) mod_ssl: Restore 2.4.29 behaviour in SSL vhost merging/enabling
   which broke some rare but previously-working configs.
*) core, log: improve sanity checks for the ErrorLog's syslog config, and
   explicitly allow only lowercase 'syslog' settings.
*) mod_http2: accurate reporting of h2 data input/output per request via
   mod_logio. Fixes an issue where output sizes where counted n-times on
   reused slave connections.
*) mod_http2: Fix unnecessary timeout waits in case streams are aborted.
*) mod_http2: restoring the v1.10.16 keepalive timeout behaviour of mod_http2.
*) mod_proxy: Do not restrict the maximum pool size for backend connections
   any longer by the maximum number of threads per process and use a better
   default if mod_http2 is loaded.
*) mod_slotmem_shm: Add generation number to shm filename to fix races
   with graceful restarts.
*) core: Preserve the original HTTP request method in the '%<m' LogFormat
   when an path-based ErrorDocument is used.
*) mod_remoteip: make proxy-protocol work on slave connections, e.g. in
   HTTP/2 requests.
*) mod_ssl: Fix merging of proxy SSL context outside <Proxy> sections,
   regression introduced in 2.4.30.
*) mod_md: Fix compilation with OpenSSL before version 1.0.2.
*) mod_dumpio: do nothing below log level TRACE7.
*) mod_remoteip: Restore compatibility with APR 1.4 (apr_sockaddr_is_wildcard).
*) core: On ECBDIC platforms, some errors related to oversized headers
   may be misreported or be logged as ASCII escapes.
*) mod_ssl: Fix cmake-based build.
*) core: Add <IfFile>, <IfDirective> and <IfSection> conditional
   section containers.

Revision 1.35 / (download) - annotate - [select for diffs], Mon Mar 26 09:30:23 2018 UTC (18 months, 3 weeks ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2018Q2-base, pkgsrc-2018Q1-base, pkgsrc-2018Q1
Branch point for: pkgsrc-2018Q2
Changes since 1.34: +5 -5 lines
Diff to previous 1.34 (colored) to selected 1.14.2.1 (colored)

apache24: updated to 2.4.33

Changes with Apache 2.4.33

  *) core: Fix request timeout logging and possible crash for error_log hooks.

  *) mod_slomem_shm: Fix failure to create balancers's slotmems in Windows MPM,
     where children processes need to attach them instead since they are owned
     by the parent process already.

  *) ab: try all destination socket addresses returned by
     apr_sockaddr_info_get instead of failing on first one when not available.
     Needed for instance if localhost resolves to both ::1 and 127.0.0.1
     e.g. if both are in /etc/hosts.

  *) ab: Use only one connection to determine working destination socket
     address.

  *) ab: LibreSSL doesn't have or require Windows applink.c.

  *) htpasswd/htdigest: Disable support for bcrypt on EBCDIC platforms.
     apr-util's bcrypt implementation doesn't tolerate EBCDIC.

  *) htpasswd/htdbm: report the right limit when get_password() overflows.

  *) htpasswd: Don't fail in -v mode if password file is unwritable.

  *) htpasswd: don't point to (unused) stack memory on output
     to make static analysers happy.

Changes with Apache 2.4.32

  *) mod_access_compat: Fail if a comment is found in an Allow or Deny
     directive.

  *) mod_authz_host: Ignore comments after "Require host", logging a
     warning, or logging an error if the line is otherwise empty.

  *) rotatelogs: Fix expansion of %Z in localtime (-l) mode, and fix
     Y2K38 bug.

  *) mod_ssl: Support SSL DN raw variable extraction without conversion
     to UTF-8, using _RAW suffix on variable names.

  *) ab: Fix https:// connection failures (regression in 2.4.30); fix
     crash generating CSV output for large -n.

Changes with Apache 2.4.31

  *) mod_proxy_fcgi: Add the support for mod_proxy's flushpackets and flushwait
     parameters.

  *) mod_ldap: Avoid possible crashes, hangs, and busy loops due to
     improper merging of the cache lock in vhost config.

  *) mpm_event: Do lingering close in worker(s).

  *) mpm_queue: Put fdqueue code in common for MPMs event and worker.

Changes with Apache 2.4.30

  *) SECURITY: CVE-2017-15710 (cve.mitre.org)
     Out of bound write in mod_authnz_ldap with AuthLDAPCharsetConfig enabled

  *) CVE-2018-1283 (cve.mitre.org)
     mod_session: CGI-like applications that intend to read from mod_session's
     'SessionEnv ON' could be fooled into reading user-supplied data instead.

  *) SECURITY: CVE-2018-1303 (cve.mitre.org)
     mod_cache_socache: Fix request headers parsing to avoid a possible crash
     with specially crafted input data.

  *) CVE-2018-1301 (cve.mitre.org)
     core: Possible crash with excessively long HTTP request headers.
     Impractical to exploit with a production build and production LogLevel.

  *) mod_authnz_ldap: Fix language long names detection as short name.

  *) mod_proxy: Worker schemes and hostnames which are too large are no
     longer fatal errors; it is logged and the truncated values are stored.

  *) CVE-2017-15715 (cve.mitre.org)
     core: Configure the regular expression engine to match '$' to the end of
     the input string only, excluding matching the end of any embedded
     newline characters. Behavior can be changed with new directive
     'RegexDefaultOptions'.

  *) SECURITY: CVE-2018-1312 (cve.mitre.org)
     mod_auth_digest: Fix generation of nonce values to prevent replay
     attacks across servers using a common Digest domain. This change
     may cause problems if used with round robin load balancers.

  *) mod_proxy: Allow setting options to globally defined balancer from
     ProxyPass used in VirtualHost. Balancers are now merged using the new
     merge_balancers method which merges the balancers options.

  *) logresolve: Fix incorrect behavior or segfault if -c flag is used
     Fixes: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823259

  *) mod_remoteip: Add support for PROXY protocol (code donated by Cloudzilla).
     Add ability for PROXY protocol processing to be optional to donated code.
     See also: http://www.haproxy.org/download/1.5/doc/proxy-protocol.txt

  *) mod_proxy, mod_ssl: Handle SSLProxy* directives in <Proxy> sections,
     allowing per backend TLS configuration.

  *) mod_proxy_uwsgi: Add in UWSGI proxy (sub)module.

  *) mod_proxy_balancer,mod_slotmem_shm: Rework SHM reuse/deletion to not
     depend on the number of restarts (non-Unix systems) and preserve shared
  *) CVE-2018-1302 (cve.mitre.org)
     mod_http2: Potential crash w/ mod_http2.

     names as much as possible on configuration changes for SHMs and persisted
     files.

  *) mod_http2: obsolete code removed, no more events on beam pool destruction,
     discourage content encoders on http2-status response (where they do not work).

  *) mpm_event: Let the listener thread do its maintenance job on resources
     shortage.

  *) mpm_event: Wakeup the listener to re-enable listening sockets.

  *) mod_ssl: The SSLCompression directive will now give an error if used
     with an OpenSSL build which does not support any compression methods.

  *) mpm_event,worker: Mask signals for threads created by modules in child
     init, so that they don't receive (implicitely) the ones meant for the MPM.

  *) mod_md: new experimental, module for managing domains across virtual hosts,
     implementing the Let's Encrypt ACMEv1 protocol to signup and renew
     certificates. Please read the modules documentation for further instructions
     on how to use it.

  *) mod_proxy_html: skip documents shorter than 4 bytes

  *) core, mpm_event: Avoid a small memory leak of the scoreboard handle, for
     the lifetime of the connection, each time it is processed by MPM event.

  *) mpm_event: Update scoreboard status for KeepAlive state.

  *) mod_ldap: Fix a case where a full LDAP cache would continually fail to
     purge old entries and log AH01323.

  *) mpm_event: close connections not reported as handled by any module to
     avoid losing track of them and leaking scoreboard entries.

  *) core: A signal received while stopping could have crashed the main
     process.

  *) mod_ssl: support for mod_md added.

  *) mod_proxy_html: process parsed comments immediately.
     Fixes bug (seen in the wild when used with IBM's HTTPD bundle)
     where parsed comments may be lost.

  *) mod_proxy_html: introduce doctype for HTML 5

  *) mod_proxy_html: fix typo-bug processing "strict" vs "transitional"
     HTML/XHTML.

  *) mpm_event: avoid a very unlikely race condition between the listener and
     the workers when the latter fails to add a connection to the pollset.

  *) core: silently ignore a not existent file path when IncludeOptional
     is used.

  *) mod_macro: fix usability of globally defined macros in .htaccess files.

  *) mod_rewrite, core: add the Vary header when a condition evaluates to true
     and the related RewriteRule is used in a Directory context
     (triggering an internal redirect).

  *) ab: Make the TLS layer aware that the underlying socket is nonblocking,
     and use/handle POLLOUT where needed to avoid busy IOs and recover write
     errors when appropriate.

  *) ab: Keep reading nonblocking to exhaust TCP or SSL buffers when previous
     read was incomplete (the SSL case can cause the next poll() to timeout
     since data are buffered already).

  *) mod_http2: avoid unnecessary data retrieval for a trace log. Allow certain
     information retrievals on null bucket beams where it makes sense.

Revision 1.34 / (download) - annotate - [select for diffs], Mon Oct 23 21:12:44 2017 UTC (23 months, 3 weeks ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2017Q4-base, pkgsrc-2017Q4
Changes since 1.33: +5 -5 lines
Diff to previous 1.33 (colored) to selected 1.14.2.1 (colored)

apache24: updated to 2.4.29

Changes with Apache 2.4.29

  *) mod_unique_id: Use output of the PRNG rather than IP address and
     pid, avoiding sleep() call and possible DNS issues at startup,
     plus improving randomness for IPv6-only hosts.

  *) mod_rewrite, core: Avoid the 'Vary: Host' response header when HTTP_HOST
     is used in a condition that evaluates to true.

  *) mod_http2: v0.10.12, removed optimization for mutex handling in bucket
     beams that could lead to assertion failure in edge cases.

  *) mod_proxy: Fix regression for non decimal loadfactor parameter introduced
     in 2.4.28.

  *) mod_authz_dbd: fix a segmentation fault if AuthzDBDQuery is not set.

  *) mod_rewrite: Add support for starting External Rewriting Programs
     as non-root user on UNIX systems by specifying username and group
     name as third argument of RewriteMap directive.

  *) core: Rewrite the Content-Length filter to avoid excessive memory
     consumption. Chunked responses will be generated in more cases
     than in previous releases.

  *) mod_ssl: Fix SessionTicket callback return value, which does seem to
     matter with OpenSSL 1.1.

Revision 1.33 / (download) - annotate - [select for diffs], Fri Oct 6 06:22:05 2017 UTC (2 years ago) by adam
Branch: MAIN
Changes since 1.32: +5 -6 lines
Diff to previous 1.32 (colored) to selected 1.14.2.1 (colored)

apache24: update to 2.4.28

Changes with Apache 2.4.28

*) SECURITY: CVE-2017-9798 (cve.mitre.org)
   Corrupted or freed memory access. <Limit[Except]> must now be used in the
   main configuration file (httpd.conf) to register HTTP methods before the
   .htaccess files.

*) event: Avoid possible blocking in the listener thread when shutting down
   connections.

*) mod_speling: Don't embed referer data in a link in error page.

*) htdigest: prevent a buffer overflow when a string exceeds the allowed max
   length in a password file.

*) mod_proxy: loadfactor parameter can now be a decimal number (eg: 1.25).

*) mod_proxy_wstunnel: Allow upgrade to any protocol dynamically.

*) mod_watchdog/mod_proxy_hcheck: Time intervals can now be spefified
   down to the millisecond. Supports 'mi' (minute), 'ms' (millisecond),
   's' (second) and 'hr' (hour!) time suffixes.

*) mod_http2: Fix for stalling when more than 32KB are written to a
   suspended stream.

*) build: allow configuration without APR sources.

*) mod_ssl, ab: Fix compatibility with LibreSSL.

*) core/log: Support use of optional "tag" in syslog entries.

*) mod_proxy: Fix ProxyAddHeaders merging.

*) core: Disallow multiple Listen on the same IP:port when listener buckets
   are configured (ListenCoresBucketsRatio > 0), consistently with the single
   bucket case (default), thus avoiding the leak of the corresponding socket
   descriptors on graceful restart.

*) event: Avoid listener periodic wake ups by using the pollset wake-ability
   when available.

*) mod_proxy_wstunnel: Fix detection of unresponded request which could have
   led to spurious HTTP 502 error messages sent on upgrade connections.

Revision 1.32 / (download) - annotate - [select for diffs], Mon Sep 18 13:34:51 2017 UTC (2 years ago) by wiz
Branch: MAIN
CVS Tags: pkgsrc-2017Q3-base, pkgsrc-2017Q3, pkgsrc-
Changes since 1.31: +2 -2 lines
Diff to previous 1.31 (colored) to selected 1.14.2.1 (colored)

Fix URL in comment.

Revision 1.31 / (download) - annotate - [select for diffs], Mon Sep 18 13:24:05 2017 UTC (2 years ago) by wiz
Branch: MAIN
Changes since 1.30: +2 -1 lines
Diff to previous 1.30 (colored) to selected 1.14.2.1 (colored)

apache24: fix "Optionsbleed" security bug

See https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html

Bump PKGREVISION.

Revision 1.29.2.1 / (download) - annotate - [select for diffs], Sun Jul 23 17:21:09 2017 UTC (2 years, 2 months ago) by spz
Branch: pkgsrc-2017Q2
Changes since 1.29: +5 -5 lines
Diff to previous 1.29 (colored) next main 1.30 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #5521 - requested by taca
www/apache24: security update

Revisions pulled up:
- www/apache24/Makefile                                         1.59
- www/apache24/distinfo                                         1.30

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	adam
   Date:		Wed Jul 12 07:01:34 UTC 2017

   Modified Files:
   	pkgsrc/www/apache24: Makefile distinfo

   Log Message:
   Changes with Apache 2.4.27

     *) COMPATIBILITY: mod_lua: Remove the undocumented exported 'apr_table'
        global variable when using Lua 5.2 or later. This was exported as a
        side effect from luaL_register, which is no longer supported as of
        Lua 5.2 which deprecates pollution of the global namespace.

     *) COMPATIBILITY: mod_http2: Disable and give warning when using Prefork.
        The server will continue to run, but HTTP/2 will no longer be negotiated.

     *) COMPATIBILITY: mod_proxy_fcgi: Revert to 2.4.20 FCGI behavior for the
        default ProxyFCGIBackendType, fixing a regression with PHP-FPM.

     *) mod_lua: Improve compatibility with Lua 5.1, 5.2 and 5.3.

     *) mod_http2: Simplify ready queue, less memory and better performance. Update
        mod_http2 version to 1.10.7.

     *) Allow single-char field names inadvertently disallowed in 2.4.25.

     *) htpasswd / htdigest: Do not apply the strict permissions of the temporary
        passwd file to a possibly existing passwd file.

     *) core: Avoid duplicate HEAD in Allow header.
        This is a regression in 2.4.24 (unreleased), 2.4.25 and 2.4.26.


   To generate a diff of this commit:
   cvs rdiff -u -r1.58 -r1.59 pkgsrc/www/apache24/Makefile
   cvs rdiff -u -r1.29 -r1.30 pkgsrc/www/apache24/distinfo

Revision 1.30 / (download) - annotate - [select for diffs], Wed Jul 12 07:01:34 2017 UTC (2 years, 3 months ago) by adam
Branch: MAIN
Changes since 1.29: +5 -5 lines
Diff to previous 1.29 (colored) to selected 1.14.2.1 (colored)

Changes with Apache 2.4.27

  *) COMPATIBILITY: mod_lua: Remove the undocumented exported 'apr_table'
     global variable when using Lua 5.2 or later. This was exported as a
     side effect from luaL_register, which is no longer supported as of
     Lua 5.2 which deprecates pollution of the global namespace.

  *) COMPATIBILITY: mod_http2: Disable and give warning when using Prefork.
     The server will continue to run, but HTTP/2 will no longer be negotiated.

  *) COMPATIBILITY: mod_proxy_fcgi: Revert to 2.4.20 FCGI behavior for the
     default ProxyFCGIBackendType, fixing a regression with PHP-FPM.

  *) mod_lua: Improve compatibility with Lua 5.1, 5.2 and 5.3.

  *) mod_http2: Simplify ready queue, less memory and better performance. Update
     mod_http2 version to 1.10.7.

  *) Allow single-char field names inadvertently disallowed in 2.4.25.

  *) htpasswd / htdigest: Do not apply the strict permissions of the temporary
     passwd file to a possibly existing passwd file.

  *) core: Avoid duplicate HEAD in Allow header.
     This is a regression in 2.4.24 (unreleased), 2.4.25 and 2.4.26.

Revision 1.29 / (download) - annotate - [select for diffs], Mon Jun 19 20:01:10 2017 UTC (2 years, 3 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2017Q2-base
Branch point for: pkgsrc-2017Q2
Changes since 1.28: +5 -5 lines
Diff to previous 1.28 (colored) to selected 1.14.2.1 (colored)

Changes with Apache 2.4.26

  *) HTTP/2 support no longer tagged as "experimental" but is instead considered
     fully production ready.

  *) mod_http2: Fix for possible CPU busy loop introduced in v1.10.3 where a stream may keep
     the session in continuous check for state changes that never happen.

  *) mod_mime: Fix error checking for quoted pairs.

  *) mod_proxy_wstunnel: Add "upgrade" parameter to allow upgrade to other
     protocols.

  *) MPMs unix: Place signals handlers and helpers out of DSOs to avoid
     a possible crash if a signal is caught during (graceful) restart.

  *) core: Deprecate ap_get_basic_auth_pw() and add
     ap_get_basic_auth_components().

  *) mod_rewrite: When a substitution is a fully qualified URL, and the
     scheme/host/port matches the current virtual host, stop interpreting the
     path component as a local path just because the first component of the
     path exists in the filesystem.  Adds RewriteOption "LegacyPrefixDocRoot"
     to revert to previous behavior.

  *) core: ap_parse_form_data() URL-decoding doesn't work on EBCDIC
     platforms.

  *) ab: enable option processing for setting a custom HTTP method also for
     non-SSL builds.

  *) core: EBCDIC fixes for interim responses with additional headers.

  *) mod_ssl: Consistently pass the expected bio_filter_in_ctx_t
     to ssl_io_filter_error().

  *) mod_env: when processing a 'SetEnv' directive, warn if the environment
     variable name includes a '='. It is likely a configuration error.

  *) Evaluate nested If/ElseIf/Else configuration blocks.

  *) mod_rewrite: Add 'BNP' (backreferences-no-plus) flag to RewriteRule to
     allow spaces in backreferences to be encoded as %20 instead of '+'.

  *) mod_rewrite: Add the possibility to limit the escaping to specific
     characters in backreferences by listing them in the B flag.

  *) mod_substitute: Fix spurious AH01328 (Line too long) errors on EBCDIC
     systems.

  *) mod_http2: fail requests without ERROR log in case we need to read interim
     responses and see only garbage. This can happen if proxied servers send
     data where none should be, e.g. a body for a HEAD request.

more...

Revision 1.28 / (download) - annotate - [select for diffs], Tue Dec 20 21:06:34 2016 UTC (2 years, 9 months ago) by taca
Branch: MAIN
CVS Tags: pkgsrc-2017Q1-base, pkgsrc-2017Q1, pkgsrc-2016Q4-base, pkgsrc-2016Q4
Changes since 1.27: +5 -7 lines
Diff to previous 1.27 (colored) to selected 1.14.2.1 (colored)

Update apache24 to 2.4.25 (Apache HTTPD 2.4.25).  2.4.24 was not released.

This release fixes several security problems, some of them are already
handled in pkgsrc.  Please refer CHANGES file in detail.

  *) SECURITY: CVE-2016-8740 (cve.mitre.org)
     mod_http2: Mitigate DoS memory exhaustion via endless
     CONTINUATION frames.
     [Naveen Tiwari <naveen.tiwari@asu.edu> and CDF/SEFCOM at Arizona State
     University, Stefan Eissing]

  *) SECURITY: CVE-2016-5387 (cve.mitre.org)
     core: Mitigate [f]cgi "httpoxy" issues.
     [Dominic Scheirlinck <dominic vendhq.com>, Yann Ylavic]

  *) SECURITY: CVE-2016-2161 (cve.mitre.org)
     mod_auth_digest: Prevent segfaults during client entry allocation when
     the shared memory space is exhausted.
     [Maksim Malyutin <m.malyutin dsec.ru>, Eric Covener, Jacob Champion]

  *) SECURITY: CVE-2016-0736 (cve.mitre.org)
     mod_session_crypto: Authenticate the session data/cookie with a
     MAC (SipHash) to prevent deciphering or tampering with a padding
     oracle attack.  [Yann Ylavic, Colm MacCarthaigh]

  *) SECURITY: CVE-2016-8743 (cve.mitre.org)
     Enforce HTTP request grammar corresponding to RFC7230 for request lines
     and request headers, to prevent response splitting and cache pollution by
     malicious clients or downstream proxies. [William Rowe, Stefan Fritsch]

Revision 1.27 / (download) - annotate - [select for diffs], Sun Dec 11 23:52:55 2016 UTC (2 years, 10 months ago) by taca
Branch: MAIN
Changes since 1.26: +2 -1 lines
Diff to previous 1.26 (colored) to selected 1.14.2.1 (colored)

Add patch for CVE-2016-8740.

Bump PKGREVISION.

Revision 1.24.2.2 / (download) - annotate - [select for diffs], Wed Sep 7 18:08:36 2016 UTC (3 years, 1 month ago) by bsiegert
Branch: pkgsrc-2016Q2
Changes since 1.24.2.1: +2 -1 lines
Diff to previous 1.24.2.1 (colored) to branchpoint 1.24 (colored) next main 1.25 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #5093 - requested by taca
www/apache24: security fix

Revisions pulled up:
- www/apache24/Makefile                                         1.48
- www/apache24/distinfo                                         1.26
- www/apache24/patches/patch-server_util__script.c              1.1

---
   Module Name:    pkgsrc
   Committed By:   wiz
   Date:           Fri Jul 29 11:11:25 UTC 2016

   Modified Files:
           pkgsrc/www/apache24: Makefile distinfo
   Added Files:
           pkgsrc/www/apache24/patches: patch-server_util__script.c

   Log Message:
   Fix httpoxy vulnerability.

   Bump PKGREVISION.

Revision 1.26 / (download) - annotate - [select for diffs], Fri Jul 29 11:11:24 2016 UTC (3 years, 2 months ago) by wiz
Branch: MAIN
CVS Tags: pkgsrc-2016Q3-base, pkgsrc-2016Q3
Changes since 1.25: +2 -1 lines
Diff to previous 1.25 (colored) to selected 1.14.2.1 (colored)

Fix httpoxy vulnerability.

Bump PKGREVISION.

Revision 1.24.2.1 / (download) - annotate - [select for diffs], Wed Jul 20 04:59:21 2016 UTC (3 years, 2 months ago) by spz
Branch: pkgsrc-2016Q2
Changes since 1.24: +5 -5 lines
Diff to previous 1.24 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #5059 - requested by taca
www/apache24: security update

Revisions pulled up:
- www/apache24/Makefile                                         1.46
- www/apache24/PLIST                                            1.22
- www/apache24/distinfo                                         1.25

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Tue Jul  5 16:13:53 UTC 2016

   Modified Files:
   	pkgsrc/www/apache24: Makefile PLIST distinfo

   Log Message:
   Update apache24 to 2.4.23.

   (NOTE: Versions 2.4.22 and 2.4.21 were not released.)

   Changes from 2.4.20 are too many to write here, please refer CHANGES file.

   And Apache 2.4.23 fixes CVE-2016-4979; X509 Client certificate based
   authentication can be bypassed when HTTP/2 is used.


   To generate a diff of this commit:
   cvs rdiff -u -r1.45 -r1.46 pkgsrc/www/apache24/Makefile
   cvs rdiff -u -r1.21 -r1.22 pkgsrc/www/apache24/PLIST
   cvs rdiff -u -r1.24 -r1.25 pkgsrc/www/apache24/distinfo

Revision 1.25 / (download) - annotate - [select for diffs], Tue Jul 5 16:13:53 2016 UTC (3 years, 3 months ago) by taca
Branch: MAIN
Changes since 1.24: +5 -5 lines
Diff to previous 1.24 (colored) to selected 1.14.2.1 (colored)

Update apache24 to 2.4.23.

(NOTE: Versions 2.4.22 and 2.4.21 were not released.)

Changes from 2.4.20 are too many to write here, please refer CHANGES file.

And Apache 2.4.23 fixes CVE-2016-4979; X509 Client certificate based
authentication can be bypassed when HTTP/2 is used.

Revision 1.24 / (download) - annotate - [select for diffs], Thu Apr 14 12:16:10 2016 UTC (3 years, 6 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2016Q2-base
Branch point for: pkgsrc-2016Q2
Changes since 1.23: +5 -5 lines
Diff to previous 1.23 (colored) to selected 1.14.2.1 (colored)

Changes with Apache 2.4.20

  *) core: Do not read .htaccess if AllowOverride and AllowOverrideList
     are "None". PR 58528.

  *) mod_proxy_express: Fix possible use of DB handle after close.  PR 59230.

  *) core/util_script: relax alphanumeric filter of enviroment variable names
     on Windows to allow '(' and ')' for passing PROGRAMFILES(X86) et.al.
     unadulterated in 64 bit versions of Windows. PR 46751.

  *) mod_http2: incrementing keepalives on each request started so that logging
     %k gives increasing numbers per master http2 connection.
     New documented variables in env, usable in custom log formats: H2_PUSH,
     H2_PUSHED, H2_PUSHED_ON, H2_STREAM_ID and H2_STREAM_TAG.

  *) mod_http2: more efficient passing of response bodies with less contention
     and file bucket forwarding.

  *) mod_http2: fix for missing score board updates on request count, fix for
     memory leak on slave connection reuse.

  *) mod_http2: Fix build on Windows from dsp files.

Revision 1.23 / (download) - annotate - [select for diffs], Sun Dec 27 12:50:54 2015 UTC (3 years, 9 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2016Q1-base, pkgsrc-2016Q1
Changes since 1.22: +5 -5 lines
Diff to previous 1.22 (colored) to selected 1.14.2.1 (colored)

Changes with Apache 2.4.18

*) mod_ssl: for all ssl_engine_vars.c lookups, fall back to master connection
   if conn_rec itself holds no valid SSLConnRec*. Fixes 58666.

*) mod_http2: connection level window for flow control is set to protocol
   maximum of 2GB-1, preventing window exhaustion when sending data on many
   streams with higher cumulative window size.
   Reducing write frequency unless push promises need to be flushed.

*) mod_http2: required minimum version of libnghttp2 is 1.2.1

*) mod_proxy_fdpass: Fix AH01153 error when using the default configuration.
   In earlier version of httpd, you can explicitelly set the 'flusher' parameter
   to 'flush' as a workaround. (i.e. flusher=flush)
   Add documentation for the 'flusher' parameter when defining a proxy worker.

*) mod_ssl: For the "SSLStaplingReturnResponderErrors off" case, make sure
   to only staple responses with certificate status "good".

*) mod_http2: new directive 'H2PushPriority' to allow priority specifications
   on server pushed streams according to their content-type.

*) mod_http2: fixes crash on connection abort for a busy connection.
   fixes crash on a request that did not produce any response.

*) mod_http2: trailers are sent after reponse body if set in request_rec
   trailers_out before the end-of-request bucket is sent through the
   output filters.

*) mod_http2: incoming trailers (headers after request body) are properly
   forwarded to the processing engine.

*) mod_http2: new directive 'H2Push' to en-/disable HTTP/2 server
   pushes a server/virtual host. Pushes are initiated by the presence
   of 'Link:' headers with relation 'preload' on a response.

*) mod_http2: write performance of http2 improved for larger resources,
   especially static files.

*) core: if the first HTTP/1.1 request on a connection goes to a server that
   prefers different protocols, these protocols are announced in a Upgrade:
   header on the response, mentioning the preferred protocols.

*) mod_http2: new directives 'H2TLSWarmUpSize' and 'H2TLSCoolDownSecs'
   to control TLS record sizes during connection lifetime.

*) mod_http2: new directive 'H2ModernTLSOnly' to enforce security
   requirements of RFC 7540 on TLS connections.

*) core: add ap_get_protocol_upgrades() to retrieve the list of protocols
   that a client could possibly upgrade to. Use in first request on a
   connection to announce protocol choices.

*) mod_http2: reworked deallocation on connection shutdown and worker
   abort. Separate parent pool for all workers. worker threads are joined
   on planned worker shutdown.

*) mod_ssl: when receiving requests for other virtual hosts than the handshake
   server, the SSL parameters are checked for equality. With equal
   configuration, requests are passed for processing. Any change will trigger
   the old behaviour of "421 Misdirected Request".
   SSL now remembers the cipher suite that was used for the last handshake.
   This is compared against for any vhost/directory cipher specification.
   Detailed examination of renegotiation is only done when these do not
   match.
   Renegotiation is 403ed when a master connection is present. Exact reason
   is given additionally in a request note.

*) core: Fix scoreboard crash (SIGBUS) on hardware requiring strict 64bit
   alignment (SPARC64, PPC64).

*) mod_cache: Accept HT (Horizontal Tab) when parsing cache related header
   fields as described in RFC7230.

*) core/util_script: making REDIRECT_URL a full URL is now opt-in
   via new 'QualifyRedirectURL' directive.

*) core: Limit to ten the number of tolerated empty lines between request,
   and consume them before the pipelining check to avoid possible response
   delay when reading the next request without flushing.

*) mod_ssl: Extend expression parser registration to support ssl variables
   in any expression using mod_rewrite syntax "%{SSL:VARNAME}" or function
   syntax "ssl(VARNAME)".

Revision 1.22 / (download) - annotate - [select for diffs], Sat Oct 17 10:16:35 2015 UTC (4 years ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2015Q4-base, pkgsrc-2015Q4
Changes since 1.21: +5 -4 lines
Diff to previous 1.21 (colored) to selected 1.14.2.1 (colored)

Changes with Apache 2.4.17

  *) mod_http2: added donated HTTP/2 implementation via core module. Similar
     configuration options to mod_ssl.

  *) mod_proxy: don't recyle backend announced "Connection: close" connections
     to avoid reusing it should the close be effective after some new request
     is ready to be sent.

  *) mod_substitute: Allow to configure the patterns merge order with the new
     SubstituteInheritBefore on|off directive.

  *) mod_proxy: Fix ProxySourceAddress binding failure with AH00938.

  *) mod_ssl: Support compilation against libssl built with OPENSSL_NO_SSL3,
     and change the compiled-in default for SSL[Proxy]Protocol to "all -SSLv3",
     in accordance with RFC 7568.

  *) mod_ssl: append :!aNULL:!eNULL:!EXP to the cipher string settings,
     instead of prepending !aNULL:!eNULL:!EXP: (as was the case in 2.4.7
     and later). Enables support for configuring the SUITEB* cipher
     strings introduced in OpenSSL 1.0.2.

  *) mod_ssl: Add support for extracting the msUPN and dnsSRV forms
     of subjectAltName entries of type "otherName" into
     SSL_{CLIENT,SERVER}_SAN_OTHER_{msUPN,dnsSRV}_n environment
     variables.

  *) mod_logio: Fix logging of %^FB (time to first byte) on the first request on
     an SSL connection.

  *) mod_cache: r->err_headers_out is not merged into
     r->headers when mod_cache is enabled and the response
     is cached for the first time.

  *) mod_slotmem_shm: Fix slots/SHM files names on restart for systems that
     can't create new (clear) slots while previous children gracefully stopping
     still use the old ones (e.g. Windows, OS2). mod_proxy_balancer failed to
     restart whenever the number of configured balancers/members changed during
     restart.

  *) core/util_script: make REDIRECT_URL a full URL.

  *) MPMs: Support SO_REUSEPORT to create multiple duplicated listener
     records for scalability.

  *) mod_proxy: Fix a race condition that caused a failed worker to be retried
     before the retry period is over.

  *) mod_autoindex: Allow autoindexes when neither mod_dir nor mod_mime are
     loaded.

  *) mod_rewrite:  Allow cookies set by mod_rewrite to contain ':' by accepting
     ';' as an alternate separator.

  *) apxs: Add HTTPD_VERSION and HTTPD_MMN to the variables available with
     apxs -q.

  *) mod_rewrite: Avoid a crash when lacking correct DB access permissions
     when using RewriteMap with MapType dbd or fastdbd.

  *) mod_authz_dbd: Avoid a crash when lacking correct DB access permissions.

  *) mod_socache_memcache: Add the 'MemcacheConnTTL' directive to control how
     long to keep idle connections with the memcache server(s).
     Change default value from 600 usec (!) to 15 sec.

  *) mod_dir: Prevent the internal identifier "httpd/unix-directory" from
     appearing as a Content-Type response header when requests for a directory
     are rewritten by mod_rewrite.

Revision 1.20.2.1 / (download) - annotate - [select for diffs], Wed Jul 22 20:12:58 2015 UTC (4 years, 2 months ago) by tron
Branch: pkgsrc-2015Q2
Changes since 1.20: +4 -7 lines
Diff to previous 1.20 (colored) next main 1.21 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #4779 - requested by taca
www/apache24: security update

Revisions pulled up:
- www/apache24/Makefile                                         1.37
- www/apache24/distinfo                                         1.21
- www/apache24/patches/patch-CVE-2015-0228                      deleted
- www/apache24/patches/patch-server_core__filters.c             deleted
- www/apache24/patches/patch-server_protocol.c                  deleted

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Mon Jul 20 00:08:35 UTC 2015

   Modified Files:
   	pkgsrc/www/apache24: Makefile distinfo
   Removed Files:
   	pkgsrc/www/apache24/patches: patch-CVE-2015-0228
   	    patch-server_core__filters.c patch-server_protocol.c

   Log Message:
   Update apache24 to 2.4.16 (Apache HTTP Server 2.4.16).

           Apache HTTP Server 2.4.16 Released

   The Apache Software Foundation and the Apache HTTP Server Project
   are pleased to announce the release of version 2.4.16 of the Apache
   HTTP Server ("Apache").  This version of Apache is our latest GA
   release of the new generation 2.4.x branch of Apache HTTPD and
   represents fifteen years of innovation by the project, and is
   recommended over all previous releases. This release of Apache is
   principally a security, feature and bug fix release. NOTE: versions
   2.4.13, 2.4.14 and 2.4.15 were not released.

   CVE-2015-3183 (cve.mitre.org)
   core: Fix chunk header parsing defect.
   Remove apr_brigade_flatten(), buffering and duplicated code from
   the HTTP_IN filter, parse chunks in a single pass with zero copy.
   Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext
   authorized characters.

   CVE-2015-3185 (cve.mitre.org)
   Replacement of ap_some_auth_required (unusable in Apache httpd 2.4)
   with new ap_some_authn_required and ap_force_authn hook.

   CVE-2015-0253 (cve.mitre.org)
   core: Fix a crash with ErrorDocument 400 pointing to a local URL-path
   with the INCLUDES filter active, introduced in 2.4.11. PR 57531.

   CVE-2015-0228 (cve.mitre.org)
   mod_lua: A maliciously crafted websockets PING after a script
   calls r:wsupgrade() can cause a child process crash.

   Also in this release are some exciting new features including:

   *) Better default recommended SSLCipherSuite and SSLProxyCipherSuite
   *) mod_proxy_scgi: ProxySCGIInternalRedirect now allows an alternate
   response header to be used by the application
   *) Event MPM improvements
   *) Various mod_proxy_* improvements
   *) mod_log_config: Add "%{UNIT}T" format to output request duration in
   seconds, milliseconds or microseconds depending on UNIT ("s", "ms",
   "us")

Revision 1.21 / (download) - annotate - [select for diffs], Mon Jul 20 00:08:35 2015 UTC (4 years, 3 months ago) by taca
Branch: MAIN
CVS Tags: pkgsrc-2015Q3-base, pkgsrc-2015Q3
Changes since 1.20: +4 -7 lines
Diff to previous 1.20 (colored) to selected 1.14.2.1 (colored)

Update apache24 to 2.4.16 (Apache HTTP Server 2.4.16).

        Apache HTTP Server 2.4.16 Released

The Apache Software Foundation and the Apache HTTP Server Project
are pleased to announce the release of version 2.4.16 of the Apache
HTTP Server ("Apache").  This version of Apache is our latest GA
release of the new generation 2.4.x branch of Apache HTTPD and
represents fifteen years of innovation by the project, and is
recommended over all previous releases. This release of Apache is
principally a security, feature and bug fix release. NOTE: versions
2.4.13, 2.4.14 and 2.4.15 were not released.

CVE-2015-3183 (cve.mitre.org)
core: Fix chunk header parsing defect.
Remove apr_brigade_flatten(), buffering and duplicated code from
the HTTP_IN filter, parse chunks in a single pass with zero copy.
Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext
authorized characters.

CVE-2015-3185 (cve.mitre.org)
Replacement of ap_some_auth_required (unusable in Apache httpd 2.4)
with new ap_some_authn_required and ap_force_authn hook.

CVE-2015-0253 (cve.mitre.org)
core: Fix a crash with ErrorDocument 400 pointing to a local URL-path
with the INCLUDES filter active, introduced in 2.4.11. PR 57531.

CVE-2015-0228 (cve.mitre.org)
mod_lua: A maliciously crafted websockets PING after a script
calls r:wsupgrade() can cause a child process crash.

Also in this release are some exciting new features including:

*) Better default recommended SSLCipherSuite and SSLProxyCipherSuite
*) mod_proxy_scgi: ProxySCGIInternalRedirect now allows an alternate
response header to be used by the application
*) Event MPM improvements
*) Various mod_proxy_* improvements
*) mod_log_config: Add "%{UNIT}T" format to output request duration in
seconds, milliseconds or microseconds depending on UNIT ("s", "ms",
"us")

Revision 1.20 / (download) - annotate - [select for diffs], Thu Jun 11 15:38:48 2015 UTC (4 years, 4 months ago) by taca
Branch: MAIN
CVS Tags: pkgsrc-2015Q2-base
Branch point for: pkgsrc-2015Q2
Changes since 1.19: +2 -1 lines
Diff to previous 1.19 (colored) to selected 1.14.2.1 (colored)

Add fix for CVE-2015-0253.

Bump PKGREVISION.

Revision 1.19 / (download) - annotate - [select for diffs], Sat Mar 28 06:28:04 2015 UTC (4 years, 6 months ago) by ryoon
Branch: MAIN
CVS Tags: pkgsrc-2015Q1-base, pkgsrc-2015Q1
Changes since 1.18: +2 -1 lines
Diff to previous 1.18 (colored) to selected 1.14.2.1 (colored)

Fix CVE-2015-0228 (lua module) with upstream patch.
lua module is not enabled by default.

Revision 1.18 / (download) - annotate - [select for diffs], Mon Feb 2 14:45:51 2015 UTC (4 years, 8 months ago) by adam
Branch: MAIN
Changes since 1.17: +4 -6 lines
Diff to previous 1.17 (colored) to selected 1.14.2.1 (colored)

Changes 2.4.12:

* CVE-2014-3583 mod_proxy_fcgi: Fix a potential crash due to buffer over-read, with response headers' size above 8K.
* CVE-2014-3581 mod_cache: Avoid a crash when Content-Type has an empty value. PR 56924.
* CVE-2014-8109 mod_lua: Fix handling of the Require line when a LuaAuthzProvider is used in multiple Require directives with different arguments.
* CVE-2013-5704 core: HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. Adds "MergeTrailers" directive to restore legacy behavior.

* Proxy FGI and websockets improvements
* Proxy capability via handler
* Finer control over scoping of RewriteRules
* Unix Domain Socket (UDS) support for mod_proxy backends.
* Support for larger shared memory sizes for mod_socache_shmcb
* mod_lua and mod_ssl enhancements
* Support named groups and backreferences within the LocationMatch, DirectoryMatch, FilesMatch and ProxyMatch directives.

Revision 1.16.2.1 / (download) - annotate - [select for diffs], Mon Jan 26 06:16:01 2015 UTC (4 years, 8 months ago) by spz
Branch: pkgsrc-2014Q4
Changes since 1.16: +2 -1 lines
Diff to previous 1.16 (colored) next main 1.17 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #4593 - requested by tron
www/apache24: security patch

Revisions pulled up:
- www/apache24/Makefile                                         1.33
- www/apache24/distinfo                                         1.17
- www/apache24/patches/patch-modules_lua_mod_lua.c              1.1

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	tron
   Date:		Thu Jan 22 20:02:37 UTC 2015

   Modified Files:
   	pkgsrc/www/apache24: Makefile distinfo
   Added Files:
   	pkgsrc/www/apache24/patches: patch-modules_lua_mod_lua.c

   Log Message:
   Add fix for CVE-2014-8109 taken for Apache SVN repository.


   To generate a diff of this commit:
   cvs rdiff -u -r1.32 -r1.33 pkgsrc/www/apache24/Makefile
   cvs rdiff -u -r1.16 -r1.17 pkgsrc/www/apache24/distinfo
   cvs rdiff -u -r0 -r1.1 \
       pkgsrc/www/apache24/patches/patch-modules_lua_mod_lua.c

Revision 1.17 / (download) - annotate - [select for diffs], Thu Jan 22 20:02:37 2015 UTC (4 years, 8 months ago) by tron
Branch: MAIN
Changes since 1.16: +2 -1 lines
Diff to previous 1.16 (colored) to selected 1.14.2.1 (colored)

Add fix for CVE-2014-8109 taken for Apache SVN repository.

Revision 1.15.2.1 / (download) - annotate - [select for diffs], Thu Oct 9 13:45:27 2014 UTC (5 years ago) by tron
Branch: pkgsrc-2014Q3
Changes since 1.15: +2 -1 lines
Diff to previous 1.15 (colored) next main 1.16 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #4519 - requested by taca
www/apache24: security patch

Revisions pulled up:
- www/apache24/Makefile                                         1.31
- www/apache24/distinfo                                         1.16
- www/apache24/patches/patch-modules_cache_cache__util.c        1.1

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Wed Oct  8 04:27:18 UTC 2014

   Modified Files:
   	pkgsrc/www/apache24: Makefile distinfo
   Added Files:
   	pkgsrc/www/apache24/patches: patch-modules_cache_cache__util.c

   Log Message:
   Add patch for CVE-2014-3581.

   Bump PKGREVISION.

Revision 1.16 / (download) - annotate - [select for diffs], Wed Oct 8 04:27:17 2014 UTC (5 years ago) by taca
Branch: MAIN
CVS Tags: pkgsrc-2014Q4-base
Branch point for: pkgsrc-2014Q4
Changes since 1.15: +2 -1 lines
Diff to previous 1.15 (colored) to selected 1.14.2.1 (colored)

Add patch for CVE-2014-3581.

Bump PKGREVISION.

Revision 1.14.2.1 / (download) - annotate - [selected], Sun Jul 27 06:12:47 2014 UTC (5 years, 2 months ago) by spz
Branch: pkgsrc-2014Q2
Changes since 1.14: +4 -4 lines
Diff to previous 1.14 (colored) next main 1.15 (colored)

Pullup ticket #4461 - requested by tron
www/apache24: security update

Revisions pulled up:
- www/apache24/Makefile                                         1.30
- www/apache24/PLIST                                            1.16
- www/apache24/distinfo                                         1.15

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	tron
   Date:		Wed Jul 23 10:34:02 UTC 2014

   Modified Files:
   	pkgsrc/www/apache24: Makefile PLIST distinfo

   Log Message:
   Update "apache24" package to version 2.4.10. Changes since 2.4.9:
   - SECURITY: CVE-2014-0117 (cve.mitre.org)
     mod_proxy: Fix crash in Connection header handling which
     allowed a denial of service attack against a reverse proxy
     with a threaded MPM.  [Ben Reser]
   - SECURITY: CVE-2014-0226 (cve.mitre.org)
     Fix a race condition in scoreboard handling, which could lead to
     a heap buffer overflow.  [Joe Orton, Eric Covener]
   - SECURITY: CVE-2014-0118 (cve.mitre.org)
     mod_deflate: The DEFLATE input filter (inflates request bodies) now
     limits the length and compression ratio of inflated request bodies to avo=
   id
     denial of sevice via highly compressed bodies.  See directives
     DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
     and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
   - SECURITY: CVE-2014-0231 (cve.mitre.org)
     mod_cgid: Fix a denial of service against CGI scripts that do
     not consume stdin that could lead to lingering HTTPD child processes
     filling up the scoreboard and eventually hanging the server.  By
     default, the client I/O timeout (Timeout directive) now applies to
     communication with scripts.  The CGIDScriptTimeout directive can be
     used to set a different timeout for communication with scripts.
     [Rainer Jung, Eric Covener, Yann Ylavic]
   - mod_ssl: Extend the scope of SSLSessionCacheTimeout to sessions
     resumed by TLS session resumption (RFC 5077). [Rainer Jung]
   - mod_deflate: Don't fail when flushing inflated data to the user-agent
     and that coincides with the end of stream ("Zlib error flushing inflate
     buffer"). Bug 56196. [Christoph Fausak <christoph fausak glueckkanja.com>]
   - mod_proxy_ajp: Forward local IP address as a custom request attribute
     like we already do for the remote port. [Rainer Jung]
   - core: Include any error notes set by modules in the canned error
     response for 403 errors.  [Jeff Trawick]
   - mod_ssl: Set an error note for requests rejected due to
     SSLStrictSNIVHostCheck.  [Jeff Trawick]
   - mod_ssl: Fix issue with redirects to error documents when handling
     SNI errors.  [Jeff Trawick]
   - mod_ssl: Fix tmp DH parameter leak, adjust selection to prefer
     larger keys and support up to 8192-bit keys.  [Ruediger Pluem,
     Joe Orton]
   - mod_dav: Fix improper encoding in PROPFIND responses.  Bug 56480.
     [Ben Reser]
   - WinNT MPM: Improve error handling for termination events in child.
     [Jeff Trawick]
   - mod_proxy: When ping/pong is configured for a worker, don't send or
     forward "100 Continue" (interim) response to the client if it does
     not expect one. [Yann Ylavic]
   - mod_ldap: Be more conservative with the last-used time for
     LDAPConnectionPoolTTL. Bug 54587 [Eric Covener]
   - mod_ldap: LDAP connections used for authn were not respecting
     LDAPConnectionPoolTTL. Bug 54587 [Eric Covener]
   - mod_proxy_fcgi: Fix occasional high CPU when handling request bodies.
     [Jeff Trawick]
   - event MPM: Fix possible crashes (third-party modules accessing c->sbh)
     or occasional missed mod_status updates under load. Bug 56639.
     [Edward Lu <Chaosed0 gmail com>]
   - mod_authnz_ldap: Support primitive LDAP servers do not accept
     filters, such as "SDBM-backed LDAP" on z/OS, by allowing a special
     filter "none" to be specified in AuthLDAPURL. [Eric Covener]
   - mod_deflate: Fix inflation of files larger than 4GB. Bug 56062.
     [Lukas Bezdicka <social v3.sk>]
   - mod_deflate: Handle Zlib header and validation bytes received in multiple
     chunks. Bug 46146. [Yann Ylavic]
   - mod_proxy: Allow reverse-proxy to be set via explicit handler.
     [ryo takatsuki <ryotakatsuki gmail com>]
   - ab: support custom HTTP method with -m argument. Bug 56604.
     [Roman Jurkov <winfinit gmail.com>]
   - mod_proxy_balancer: Correctly encode user provided data in management
     interface. Bug 56532 [Maksymilian, <max cert.cx>]
   - mod_proxy_fcgi: Support iobuffersize parameter.  [Jeff Trawick]
   - mod_auth_form: Add a debug message when the fields on a form are not
     recognised. [Graham Leggett]
   - mod_cache: Preserve non-cacheable headers forwarded from an origin 304
     response. Bug 55547.  [Yann Ylavic]
   - mod_proxy_wstunnel: Fix the use of SSL connections with the "wss:"
     scheme. Bug 55320. [Alex Liu <alex.leo.ca gmail.com>]
   - mod_socache_shmcb: Correct counting of expirations for status display.
     Expirations happening during retrieval were not counted. [Rainer Jung]
   - mod_cache: Retry unconditional request with the full URL (including the
     query-string) when the origin server's 304 response does not match the
     conditions used to revalidate the stale entry.  [Yann Ylavic].
   - mod_alias: Stop setting CONTEXT_PREFIX and CONTEXT_DOCUMENT environment
     variables as a result of AliasMatch. [Eric Covener]
   - mod_cache: Don't add cached/revalidated entity headers to a 304 response.
     Bug 55547.  [Yann Ylavic]
   - mod_proxy_scgi: Support Unix sockets.  ap_proxy_port_of_scheme():
     Support default SCGI port (4000).  [Jeff Trawick]
   - mod_expires: don't add Expires header to error responses (4xx/5xx),
     be they generated or forwarded. Bug 55669.  [Yann Ylavic]
   - mod_proxy_fcgi: Don't segfault when failing to connect to the backend.
     (regression in 2.4.9 release) [Jeff Trawick]
   - mod_authn_socache: Fix crash at startup in certain configurations.
     Bug 56371. (regression in 2.4.7) [Jan Kaluza]
   - mod_ssl: restore argument structure for "exec"-type SSLPassPhraseDialog
     programs to the form used in releases up to 2.4.7, and emulate
     a backwards-compatible behavior for existing setups. [Kaspar Brand]
   - mod_ssl: Add SSLOCSPUseRequestNonce directive to control whether or not
     OCSP requests should use a nonce to be checked against the responder's
     one. Bug 56233. [Yann Ylavic, Kaspar Brand]
   - mod_ssl: "SSLEngine off" will now override a Listen-based default
     and does disable mod_ssl for the vhost.  [Joe Orton]
   - mod_lua: Enforce the max post size allowed via r:parsebody()
     [Daniel Gruno]
   - mod_lua: Use binary comparison to find boundaries for multipart
     objects, as to not terminate our search prematurely when hitting
     a NULL byte. [Daniel Gruno]
   - mod_ssl: add workaround for SSLCertificateFile when using OpenSSL
     versions before 0.9.8h and not specifying an SSLCertificateChainFile
     (regression introduced with 2.4.8). Bug 56410. [Kaspar Brand]
   - mod_ssl: bring SNI behavior into better conformance with RFC 6066:
     no longer send warning-level unrecognized_name(112) alerts,
     and limit startup warnings to cases where an OpenSSL version
     without TLS extension support is used. Bug 56241. [Kaspar Brand]
   - mod_proxy_html: Avoid some possible memory access violation in case of
     specially crafted files, when the ProxyHTMLMeta directive is turned on.
     Follow up of Bug 56287 [Christophe Jaillet]
   - mod_auth_form: Make sure the optional functions are loaded even when
     the AuthFormProvider isn't specified. [Graham Leggett]
   - mod_ssl: avoid processing bogus SSLCertificateKeyFile values
     (and logging garbled file names). Bug 56306. [Kaspar Brand]
   - mod_ssl: fix merging of global and vhost-level settings with the
     SSLCertificateFile, SSLCertificateKeyFile, and SSLOpenSSLConfCmd
     directives. Bug 56353. [Kaspar Brand]
   - mod_headers: Allow the "value" parameter of Header and RequestHeader to
     contain an ap_expr expression if prefixed with "expr=3D". [Eric Covener]
   - rotatelogs: Avoid creation of zombie processes when -p is used on
     Unix platforms.  [Joe Orton]
   - mod_authnz_fcgi: New module to enable FastCGI authorizer
     applications to authenticate and/or authorize clients.
     [Jeff Trawick]
   - mod_proxy: Do not try to parse the regular expressions passed by
     ProxyPassMatch as URL as they do not follow their syntax.
     Bug 56074. [Ruediger Pluem]
   - mod_reqtimeout: Resolve unexpected timeouts on keepalive requests
     under the Event MPM. Bug 56216.  [Frank Meier <frank meier ergon ch>]
   - mod_proxy_fcgi: Fix sending of response without some HTTP headers
     that might be set by filters.  [Jim Riggs <jim riggs.me>]
   - mod_proxy_html: Do not delete the wrong data from HTML code when a
     "http-equiv" meta tag specifies a Content-Type behind any other
     "http-equiv" meta tag. Bug 56287 [Micha Lenk <micha lenk info>]
   - mod_proxy: Don't reuse a SSL backend connection whose requested SNI
     differs. Bug 55782.  [Yann Ylavic]
   - Add suspend_connection and resume_connection hooks to notify modules
     when the thread/connection relationship changes.  (Should be implemented
     for any third-party async MPMs.)  [Jeff Trawick]
   - mod_proxy_wstunnel: Don't issue AH02447 and log a 500 on routine
     hangups from websockets origin servers. Bug 56299
     [Yann Ylavic, Edward Lu <Chaosed0 gmail com>, Eric Covener]
   - mod_proxy_wstunnel: Don't pool backend websockets connections,
     because we need to handshake every time. Bug 55890.
     [Eric Covener]
   - mod_lua: Redesign how request record table access behaves,
     in order to utilize the request record from within these tables.
     [Daniel Gruno]
   - mod_lua: Add r:wspeek for peeking at WebSocket frames. [Daniel Gruno]

   - mod_lua: Log an error when the initial parsing of a Lua file fails.
     [Daniel Gruno, Felipe Daragon <filipe syhunt com>]
   - mod_lua: Reformat and escape script error output.
     [Daniel Gruno, Felipe Daragon <filipe syhunt com>]
   - mod_lua: URL-escape cookie keys/values to prevent tainted cookie data
     from causing response splitting.
     [Daniel Gruno, Felipe Daragon <filipe syhunt com>]
   - mod_lua: Disallow newlines in table values inside the request_rec,
     to prevent HTTP Response Splitting via tainted headers.
     [Daniel Gruno, Felipe Daragon <filipe syhunt com>]
   - mod_lua: Remove the non-working early/late arguments for
     LuaHookCheckUserID. [Daniel Gruno]
   - mod_lua: Change IVM storage to use shm [Daniel Gruno]
   - mod_lua: More verbose error logging when a handler function cannot be
     found. [Daniel Gruno]


   To generate a diff of this commit:
   cvs rdiff -u -r1.29 -r1.30 pkgsrc/www/apache24/Makefile
   cvs rdiff -u -r1.15 -r1.16 pkgsrc/www/apache24/PLIST
   cvs rdiff -u -r1.14 -r1.15 pkgsrc/www/apache24/distinfo

Revision 1.15 / (download) - annotate - [select for diffs], Wed Jul 23 10:34:02 2014 UTC (5 years, 2 months ago) by tron
Branch: MAIN
CVS Tags: pkgsrc-2014Q3-base
Branch point for: pkgsrc-2014Q3
Changes since 1.14: +4 -4 lines
Diff to previous 1.14 (colored) to selected 1.14.2.1 (colored)

Update "apache24" package to version 2.4.10. Changes since 2.4.9:
- SECURITY: CVE-2014-0117 (cve.mitre.org)
  mod_proxy: Fix crash in Connection header handling which
  allowed a denial of service attack against a reverse proxy
  with a threaded MPM.  [Ben Reser]
- SECURITY: CVE-2014-0226 (cve.mitre.org)
  Fix a race condition in scoreboard handling, which could lead to
  a heap buffer overflow.  [Joe Orton, Eric Covener]
- SECURITY: CVE-2014-0118 (cve.mitre.org)
  mod_deflate: The DEFLATE input filter (inflates request bodies) now
  limits the length and compression ratio of inflated request bodies to avoid
  denial of sevice via highly compressed bodies.  See directives
  DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
  and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
- SECURITY: CVE-2014-0231 (cve.mitre.org)
  mod_cgid: Fix a denial of service against CGI scripts that do
  not consume stdin that could lead to lingering HTTPD child processes
  filling up the scoreboard and eventually hanging the server.  By
  default, the client I/O timeout (Timeout directive) now applies to
  communication with scripts.  The CGIDScriptTimeout directive can be
  used to set a different timeout for communication with scripts.
  [Rainer Jung, Eric Covener, Yann Ylavic]
- mod_ssl: Extend the scope of SSLSessionCacheTimeout to sessions
  resumed by TLS session resumption (RFC 5077). [Rainer Jung]
- mod_deflate: Don't fail when flushing inflated data to the user-agent
  and that coincides with the end of stream ("Zlib error flushing inflate
  buffer"). Bug 56196. [Christoph Fausak <christoph fausak glueckkanja.com>]
- mod_proxy_ajp: Forward local IP address as a custom request attribute
  like we already do for the remote port. [Rainer Jung]
- core: Include any error notes set by modules in the canned error
  response for 403 errors.  [Jeff Trawick]
- mod_ssl: Set an error note for requests rejected due to
  SSLStrictSNIVHostCheck.  [Jeff Trawick]
- mod_ssl: Fix issue with redirects to error documents when handling
  SNI errors.  [Jeff Trawick]
- mod_ssl: Fix tmp DH parameter leak, adjust selection to prefer
  larger keys and support up to 8192-bit keys.  [Ruediger Pluem,
  Joe Orton]
- mod_dav: Fix improper encoding in PROPFIND responses.  Bug 56480.
  [Ben Reser]
- WinNT MPM: Improve error handling for termination events in child.
  [Jeff Trawick]
- mod_proxy: When ping/pong is configured for a worker, don't send or
  forward "100 Continue" (interim) response to the client if it does
  not expect one. [Yann Ylavic]
- mod_ldap: Be more conservative with the last-used time for
  LDAPConnectionPoolTTL. Bug 54587 [Eric Covener]
- mod_ldap: LDAP connections used for authn were not respecting
  LDAPConnectionPoolTTL. Bug 54587 [Eric Covener]
- mod_proxy_fcgi: Fix occasional high CPU when handling request bodies.
  [Jeff Trawick]
- event MPM: Fix possible crashes (third-party modules accessing c->sbh)
  or occasional missed mod_status updates under load. Bug 56639.
  [Edward Lu <Chaosed0 gmail com>]
- mod_authnz_ldap: Support primitive LDAP servers do not accept
  filters, such as "SDBM-backed LDAP" on z/OS, by allowing a special
  filter "none" to be specified in AuthLDAPURL. [Eric Covener]
- mod_deflate: Fix inflation of files larger than 4GB. Bug 56062.
  [Lukas Bezdicka <social v3.sk>]
- mod_deflate: Handle Zlib header and validation bytes received in multiple
  chunks. Bug 46146. [Yann Ylavic]
- mod_proxy: Allow reverse-proxy to be set via explicit handler.
  [ryo takatsuki <ryotakatsuki gmail com>]
- ab: support custom HTTP method with -m argument. Bug 56604.
  [Roman Jurkov <winfinit gmail.com>]
- mod_proxy_balancer: Correctly encode user provided data in management
  interface. Bug 56532 [Maksymilian, <max cert.cx>]
- mod_proxy_fcgi: Support iobuffersize parameter.  [Jeff Trawick]
- mod_auth_form: Add a debug message when the fields on a form are not
  recognised. [Graham Leggett]
- mod_cache: Preserve non-cacheable headers forwarded from an origin 304
  response. Bug 55547.  [Yann Ylavic]
- mod_proxy_wstunnel: Fix the use of SSL connections with the "wss:"
  scheme. Bug 55320. [Alex Liu <alex.leo.ca gmail.com>]
- mod_socache_shmcb: Correct counting of expirations for status display.
  Expirations happening during retrieval were not counted. [Rainer Jung]
- mod_cache: Retry unconditional request with the full URL (including the
  query-string) when the origin server's 304 response does not match the
  conditions used to revalidate the stale entry.  [Yann Ylavic].
- mod_alias: Stop setting CONTEXT_PREFIX and CONTEXT_DOCUMENT environment
  variables as a result of AliasMatch. [Eric Covener]
- mod_cache: Don't add cached/revalidated entity headers to a 304 response.
  Bug 55547.  [Yann Ylavic]
- mod_proxy_scgi: Support Unix sockets.  ap_proxy_port_of_scheme():
  Support default SCGI port (4000).  [Jeff Trawick]
- mod_expires: don't add Expires header to error responses (4xx/5xx),
  be they generated or forwarded. Bug 55669.  [Yann Ylavic]
- mod_proxy_fcgi: Don't segfault when failing to connect to the backend.
  (regression in 2.4.9 release) [Jeff Trawick]
- mod_authn_socache: Fix crash at startup in certain configurations.
  Bug 56371. (regression in 2.4.7) [Jan Kaluza]
- mod_ssl: restore argument structure for "exec"-type SSLPassPhraseDialog
  programs to the form used in releases up to 2.4.7, and emulate
  a backwards-compatible behavior for existing setups. [Kaspar Brand]
- mod_ssl: Add SSLOCSPUseRequestNonce directive to control whether or not
  OCSP requests should use a nonce to be checked against the responder's
  one. Bug 56233. [Yann Ylavic, Kaspar Brand]
- mod_ssl: "SSLEngine off" will now override a Listen-based default
  and does disable mod_ssl for the vhost.  [Joe Orton]
- mod_lua: Enforce the max post size allowed via r:parsebody()
  [Daniel Gruno]
- mod_lua: Use binary comparison to find boundaries for multipart
  objects, as to not terminate our search prematurely when hitting
  a NULL byte. [Daniel Gruno]
- mod_ssl: add workaround for SSLCertificateFile when using OpenSSL
  versions before 0.9.8h and not specifying an SSLCertificateChainFile
  (regression introduced with 2.4.8). Bug 56410. [Kaspar Brand]
- mod_ssl: bring SNI behavior into better conformance with RFC 6066:
  no longer send warning-level unrecognized_name(112) alerts,
  and limit startup warnings to cases where an OpenSSL version
  without TLS extension support is used. Bug 56241. [Kaspar Brand]
- mod_proxy_html: Avoid some possible memory access violation in case of
  specially crafted files, when the ProxyHTMLMeta directive is turned on.
  Follow up of Bug 56287 [Christophe Jaillet]
- mod_auth_form: Make sure the optional functions are loaded even when
  the AuthFormProvider isn't specified. [Graham Leggett]
- mod_ssl: avoid processing bogus SSLCertificateKeyFile values
  (and logging garbled file names). Bug 56306. [Kaspar Brand]
- mod_ssl: fix merging of global and vhost-level settings with the
  SSLCertificateFile, SSLCertificateKeyFile, and SSLOpenSSLConfCmd
  directives. Bug 56353. [Kaspar Brand]
- mod_headers: Allow the "value" parameter of Header and RequestHeader to
  contain an ap_expr expression if prefixed with "expr=". [Eric Covener]
- rotatelogs: Avoid creation of zombie processes when -p is used on
  Unix platforms.  [Joe Orton]
- mod_authnz_fcgi: New module to enable FastCGI authorizer
  applications to authenticate and/or authorize clients.
  [Jeff Trawick]
- mod_proxy: Do not try to parse the regular expressions passed by
  ProxyPassMatch as URL as they do not follow their syntax.
  Bug 56074. [Ruediger Pluem]
- mod_reqtimeout: Resolve unexpected timeouts on keepalive requests
  under the Event MPM. Bug 56216.  [Frank Meier <frank meier ergon ch>]
- mod_proxy_fcgi: Fix sending of response without some HTTP headers
  that might be set by filters.  [Jim Riggs <jim riggs.me>]
- mod_proxy_html: Do not delete the wrong data from HTML code when a
  "http-equiv" meta tag specifies a Content-Type behind any other
  "http-equiv" meta tag. Bug 56287 [Micha Lenk <micha lenk info>]
- mod_proxy: Don't reuse a SSL backend connection whose requested SNI
  differs. Bug 55782.  [Yann Ylavic]
- Add suspend_connection and resume_connection hooks to notify modules
  when the thread/connection relationship changes.  (Should be implemented
  for any third-party async MPMs.)  [Jeff Trawick]
- mod_proxy_wstunnel: Don't issue AH02447 and log a 500 on routine
  hangups from websockets origin servers. Bug 56299
  [Yann Ylavic, Edward Lu <Chaosed0 gmail com>, Eric Covener]
- mod_proxy_wstunnel: Don't pool backend websockets connections,
  because we need to handshake every time. Bug 55890.
  [Eric Covener]
- mod_lua: Redesign how request record table access behaves,
  in order to utilize the request record from within these tables.
  [Daniel Gruno]
- mod_lua: Add r:wspeek for peeking at WebSocket frames. [Daniel Gruno]

- mod_lua: Log an error when the initial parsing of a Lua file fails.
  [Daniel Gruno, Felipe Daragon <filipe syhunt com>]
- mod_lua: Reformat and escape script error output.
  [Daniel Gruno, Felipe Daragon <filipe syhunt com>]
- mod_lua: URL-escape cookie keys/values to prevent tainted cookie data
  from causing response splitting.
  [Daniel Gruno, Felipe Daragon <filipe syhunt com>]
- mod_lua: Disallow newlines in table values inside the request_rec,
  to prevent HTTP Response Splitting via tainted headers.
  [Daniel Gruno, Felipe Daragon <filipe syhunt com>]
- mod_lua: Remove the non-working early/late arguments for
  LuaHookCheckUserID. [Daniel Gruno]
- mod_lua: Change IVM storage to use shm [Daniel Gruno]
- mod_lua: More verbose error logging when a handler function cannot be
  found. [Daniel Gruno]

Revision 1.14 / (download) - annotate - [select for diffs], Mon Jun 23 11:49:36 2014 UTC (5 years, 3 months ago) by wiz
Branch: MAIN
CVS Tags: pkgsrc-2014Q2-base
Branch point for: pkgsrc-2014Q2
Changes since 1.13: +2 -2 lines
Diff to previous 1.13 (colored) to selected 1.14.2.1 (colored)

Fix path to apache_runtime_status file.
From ISIHARA Takanori in PR 48939.
Bump PKGREVISION.

Revision 1.11.2.1 / (download) - annotate - [select for diffs], Fri Mar 21 08:02:35 2014 UTC (5 years, 6 months ago) by spz
Branch: pkgsrc-2013Q4
Changes since 1.11: +4 -4 lines
Diff to previous 1.11 (colored) next main 1.12 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #4349 - requested by tron
www/apache24: security update

Revisions pulled up:
- www/apache24/Makefile                                         1.26
- www/apache24/PLIST                                            1.15
- www/apache24/distinfo                                         1.13

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	adam
   Date:		Tue Mar 18 20:09:08 UTC 2014

   Modified Files:
   	pkgsrc/www/apache24: Makefile PLIST distinfo

   Log Message:
   Changes 2.4.9:
   *) mod_ssl: Work around a bug in some older versions of OpenSSL that
      would cause a crash in SSL_get_certificate for servers where the
      certificate hadn't been sent.
   *) mod_lua: Add a fixups hook that checks if the original request is intend=
   ed
      for LuaMapHandler. This fixes a bug where FallbackResource invalidates t=
   he
      LuaMapHandler directive in certain cases by changing the URI before the =
   map
      handler code executes

   Changes 2.4.8:
   *) SECURITY: CVE-2014-0098 (cve.mitre.org)
      Clean up cookie logging with fewer redundant string parsing passes.
      Log only cookies with a value assignment. Prevents segfaults when
      logging truncated cookies.
   *) SECURITY: CVE-2013-6438 (cve.mitre.org)
      mod_dav: Keep track of length of cdata properly when removing
      leading spaces. Eliminates a potential denial of service from
      specifically crafted DAV WRITE requests
   *) core: Support named groups and backreferences within the LocationMatch,
      DirectoryMatch, FilesMatch and ProxyMatch directives. (Requires
      non-ancient PCRE library)
   *) core: draft-ietf-httpbis-p1-messaging-23 corrections regarding
      TE/CL conflicts.
   *) mod_dir: Add DirectoryCheckHandler to allow a 2.2-like behavior, skipping
      execution when a handler is already set.
   *) mod_ssl: Do not perform SNI / Host header comparison in case of a
      forward proxy request.
   *) mod_ssl: Remove the hardcoded algorithm-type dependency for the
      SSLCertificateFile and SSLCertificateKeyFile directives, to enable
      future algorithm agility, and deprecate the SSLCertificateChainFile
      directive (obsoleted by SSLCertificateFile).
   *) mod_rewrite: Add RewriteOptions InheritDown, InheritDownBefore,
      and IgnoreInherit to allow RewriteRules to be pushed from parent scopes
      to child scopes without explicitly configuring each child scope.
   *) prefork: Fix long delays when doing a graceful restart.
   *) FreeBSD: Disable IPv4-mapped listening sockets by default for versions
      5+ instead of just for FreeBSD 5.
   *) mod_proxy_wstunnel: Avoid busy loop on client errors, drop message
      IDs 02445, 02446, and 02448 to TRACE1 from DEBUG.
   *) mod_remoteip: Correct the trusted proxy match test.
   *) mod_proxy_fcgi: Fix error message when an unexpected protocol version
      number is received from the application.
   *) mod_remoteip: Use the correct IP addresses to populate the proxy_ips fie=
   ld.
   *) mod_lua: Update r:setcookie() to accept a table of options and add domai=
   n,
      path and httponly to the list of options available to set.
   *) mod_lua: Fix r:setcookie() to add, rather than replace,
      the Set-Cookie header.
   *) mod_lua: Allow for database results to be returned as a hash with
      row-name/value pairs instead of just row-number/value.
   *) mod_rewrite: Add %{CONN_REMOTE_ADDR} as the non-useragent counterpart to
      %{REMOTE_ADDR}.
   *) WinNT MPM: If ap_run_pre_connection() fails or sets c->aborted, don't
      save the socket for reuse by the next worker as if it were an
      APR_SO_DISCONNECTED socket. Restores 2.2 behavior.
   *) mod_dir: Don't search for a DirectoryIndex or DirectorySlash on a URL
      that was just rewritten by mod_rewrite.
   *) mod_session: When we have a session we were unable to decode,
      behave as if there was no session at all.
   *) mod_session: Fix problems interpreting the SessionInclude and
      SessionExclude configuration.
   *) mod_authn_core: Allow <AuthnProviderAlias>'es to be seen from auth
      stanzas under virtual hosts.
   *) mod_proxy_fcgi: Use apr_socket_timeout_get instead of hard-coded
      30 seconds timeout.
   *) mod_proxy: Added support for unix domain sockets as the
      backend server endpoint
   *) build: only search for modules (config*.m4) in known subdirectories, see
      build/config-stubs.
   *) mod_cache_disk: Fix potential hangs on Windows when using mod_cache_disk.
   *) mod_ssl: Add support for OpenSSL configuration commands by introducing
      the SSLOpenSSLConfCmd directive.
   *) mod_proxy: Remove (never documented) <Proxy ~ wildcard-url> syntax which
      is equivalent to <ProxyMatch wildcard-url>.
   *) mod_authz_user, mod_authz_host, mod_authz_groupfile, mod_authz_dbm,
      mod_authz_dbd, mod_authnz_ldap: Support the expression parser within the
      require directives.
   *) mod_proxy_http: Core dumped under high load.
   *) mod_socache_shmcb.c: Remove arbitrary restriction on shared memory size
      previously limited to 64MB.
   *) mod_lua: Use binary copy when dealing with uploads through r:parsebody()
      to prevent truncating files.


   To generate a diff of this commit:
   cvs rdiff -u -r1.25 -r1.26 pkgsrc/www/apache24/Makefile
   cvs rdiff -u -r1.14 -r1.15 pkgsrc/www/apache24/PLIST
   cvs rdiff -u -r1.12 -r1.13 pkgsrc/www/apache24/distinfo

Revision 1.13 / (download) - annotate - [select for diffs], Tue Mar 18 20:09:08 2014 UTC (5 years, 7 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2014Q1-base, pkgsrc-2014Q1
Changes since 1.12: +4 -4 lines
Diff to previous 1.12 (colored) to selected 1.14.2.1 (colored)

Changes 2.4.9:
*) mod_ssl: Work around a bug in some older versions of OpenSSL that
   would cause a crash in SSL_get_certificate for servers where the
   certificate hadn't been sent.
*) mod_lua: Add a fixups hook that checks if the original request is intended
   for LuaMapHandler. This fixes a bug where FallbackResource invalidates the
   LuaMapHandler directive in certain cases by changing the URI before the map
   handler code executes

Changes 2.4.8:
*) SECURITY: CVE-2014-0098 (cve.mitre.org)
   Clean up cookie logging with fewer redundant string parsing passes.
   Log only cookies with a value assignment. Prevents segfaults when
   logging truncated cookies.
*) SECURITY: CVE-2013-6438 (cve.mitre.org)
   mod_dav: Keep track of length of cdata properly when removing
   leading spaces. Eliminates a potential denial of service from
   specifically crafted DAV WRITE requests
*) core: Support named groups and backreferences within the LocationMatch,
   DirectoryMatch, FilesMatch and ProxyMatch directives. (Requires
   non-ancient PCRE library)
*) core: draft-ietf-httpbis-p1-messaging-23 corrections regarding
   TE/CL conflicts.
*) mod_dir: Add DirectoryCheckHandler to allow a 2.2-like behavior, skipping
   execution when a handler is already set.
*) mod_ssl: Do not perform SNI / Host header comparison in case of a
   forward proxy request.
*) mod_ssl: Remove the hardcoded algorithm-type dependency for the
   SSLCertificateFile and SSLCertificateKeyFile directives, to enable
   future algorithm agility, and deprecate the SSLCertificateChainFile
   directive (obsoleted by SSLCertificateFile).
*) mod_rewrite: Add RewriteOptions InheritDown, InheritDownBefore,
   and IgnoreInherit to allow RewriteRules to be pushed from parent scopes
   to child scopes without explicitly configuring each child scope.
*) prefork: Fix long delays when doing a graceful restart.
*) FreeBSD: Disable IPv4-mapped listening sockets by default for versions
   5+ instead of just for FreeBSD 5.
*) mod_proxy_wstunnel: Avoid busy loop on client errors, drop message
   IDs 02445, 02446, and 02448 to TRACE1 from DEBUG.
*) mod_remoteip: Correct the trusted proxy match test.
*) mod_proxy_fcgi: Fix error message when an unexpected protocol version
   number is received from the application.
*) mod_remoteip: Use the correct IP addresses to populate the proxy_ips field.
*) mod_lua: Update r:setcookie() to accept a table of options and add domain,
   path and httponly to the list of options available to set.
*) mod_lua: Fix r:setcookie() to add, rather than replace,
   the Set-Cookie header.
*) mod_lua: Allow for database results to be returned as a hash with
   row-name/value pairs instead of just row-number/value.
*) mod_rewrite: Add %{CONN_REMOTE_ADDR} as the non-useragent counterpart to
   %{REMOTE_ADDR}.
*) WinNT MPM: If ap_run_pre_connection() fails or sets c->aborted, don't
   save the socket for reuse by the next worker as if it were an
   APR_SO_DISCONNECTED socket. Restores 2.2 behavior.
*) mod_dir: Don't search for a DirectoryIndex or DirectorySlash on a URL
   that was just rewritten by mod_rewrite.
*) mod_session: When we have a session we were unable to decode,
   behave as if there was no session at all.
*) mod_session: Fix problems interpreting the SessionInclude and
   SessionExclude configuration.
*) mod_authn_core: Allow <AuthnProviderAlias>'es to be seen from auth
   stanzas under virtual hosts.
*) mod_proxy_fcgi: Use apr_socket_timeout_get instead of hard-coded
   30 seconds timeout.
*) mod_proxy: Added support for unix domain sockets as the
   backend server endpoint
*) build: only search for modules (config*.m4) in known subdirectories, see
   build/config-stubs.
*) mod_cache_disk: Fix potential hangs on Windows when using mod_cache_disk.
*) mod_ssl: Add support for OpenSSL configuration commands by introducing
   the SSLOpenSSLConfCmd directive.
*) mod_proxy: Remove (never documented) <Proxy ~ wildcard-url> syntax which
   is equivalent to <ProxyMatch wildcard-url>.
*) mod_authz_user, mod_authz_host, mod_authz_groupfile, mod_authz_dbm,
   mod_authz_dbd, mod_authnz_ldap: Support the expression parser within the
   require directives.
*) mod_proxy_http: Core dumped under high load.
*) mod_socache_shmcb.c: Remove arbitrary restriction on shared memory size
   previously limited to 64MB.
*) mod_lua: Use binary copy when dealing with uploads through r:parsebody()
   to prevent truncating files.

Revision 1.12 / (download) - annotate - [select for diffs], Thu Feb 13 07:56:36 2014 UTC (5 years, 8 months ago) by tron
Branch: MAIN
Changes since 1.11: +1 -2 lines
Diff to previous 1.11 (colored) to selected 1.14.2.1 (colored)

Remove support for pre-beta snapshot of OpenSSL 1.0.1.

Revision 1.11 / (download) - annotate - [select for diffs], Sun Dec 1 10:02:34 2013 UTC (5 years, 10 months ago) by ryoon
Branch: MAIN
CVS Tags: pkgsrc-2013Q4-base
Branch point for: pkgsrc-2013Q4
Changes since 1.10: +4 -4 lines
Diff to previous 1.10 (colored) to selected 1.14.2.1 (colored)

Update to 2.4.7

Changelog:
Changes with Apache 2.4.7

  *) APR 1.5.0 or later is now required for the event MPM.

  *) slotmem_shm: Error detection. [Jim Jagielski]

  *) event: Use skiplist data structure. [Jim Jagielski]

  *) mpm_unix: Add ap_mpm_podx_* implementation to avoid code duplication
     and align w/ trunk. [Jim Jagielski]

  *) Fix potential rejection of valid MaxMemFree and ThreadStackSize
     directives.  [Mike Rumph <mike.rumph oracle.com>]

  *) mod_proxy_fcgi: Remove 64K limit on encoded length of all envvars.
     An individual envvar with an encoded length of more than 16K will be
     omitted.  [Jeff Trawick]

  *) mod_proxy_fcgi: Handle reading protocol data that is split between
     packets.  [Jeff Trawick]

  *) mod_ssl: Improve handling of ephemeral DH and ECDH keys by
     allowing custom parameters to be configured via SSLCertificateFile,
     and by adding standardized DH parameters for 1024/2048/3072/4096 bits.
     Unless custom parameters are configured, the standardized parameters
     are applied based on the certificate's RSA/DSA key size. [Kaspar Brand]

  *) mod_ssl, configure: Require OpenSSL 0.9.8a or later. [Kaspar Brand]

  *) mod_ssl: drop support for export-grade ciphers with ephemeral RSA
     keys, and unconditionally disable aNULL, eNULL and EXP ciphers
     (not overridable via SSLCipherSuite). [Kaspar Brand]

  *) Add experimental cmake-based build system for Windows.  [Jeff Trawick,
     Tom Donovan]

  *) event MPM: Fix possible crashes (third party modules accessing c->sbh)
     or occasional missed mod_status updates for some keepalive requests
     under load. [Eric Covener]

  *) mod_authn_socache: Support optional initialization arguments for
     socache providers.  [Chris Darroch]

  *) mod_session: Reset the max-age on session save. Bug 47476. [Alexey
     Varlamov <alexey.v.varlamov gmail com>]

  *) mod_session: After parsing the value of the header specified by the
     SessionHeader directive, remove the value from the response. Bug 55279.
     [Graham Leggett]

  *) mod_headers: Allow for format specifiers in the substitution string
     when using Header edit. [Daniel Ruggeri]

  *) mod_dav: dav_resource->uri is treated as unencoded. This was an
     unnecessary ABI changed introduced in 2.4.6. Bug 55397.

  *) mod_dav: Don't require lock tokens for COPY source. Bug 55306.

  *) core: Don't truncate output when sending is interrupted by a signal,
     such as from an exiting CGI process. Bug 55643. [Jeff Trawick]

  *) WinNT MPM: Exit the child if the parent process crashes or is terminated.
     [Oracle Corporation]

  *) Windows: Correct failure to discard stderr in some error log
     configurations.  (Error message AH00093)  [Jeff Trawick]

  *) mod_session_crypto: Allow using exec: calls to obtain session
     encryption key.  [Daniel Ruggeri]

  *) core: Add missing Reason-Phrase in HTTP response headers.
     Bug 54946. [Rainer Jung]

  *) mod_rewrite: Make rewrite websocket-aware to allow proxying.
     Bug 55598. [Chris Harris <chris.harris kitware com>]

  *) mod_ldap: When looking up sub-groups, use an implicit objectClass=*
     instead of an explicit cn=* filter. [David Hawes <dhawes vt.edu>]

  *) ab: Add wait time, fix processing time, and output write errors only if
     they occured. [Christophe Jaillet]

  *) worker MPM: Don't forcibly kill worker threads if the child process is
     exiting gracefully.  [Oracle Corporation]

  *) core: apachectl -S prints wildcard name-based virtual hosts twice.
     Bug 54948 [Eric Covener]

  *) mod_auth_basic: Add AuthBasicUseDigestAlgorithm directive to
     allow migration of passwords from digest to basic authentication.
     [Chris Darroch]

  *) ab: Add a new -l parameter in order not to check the length of the responses.
     This can be usefull with dynamic pages.
     Bug 9945, Bug 27888, Bug 42040 [<ccikrs1 cranbrook edu>]

  *) Suppress formatting of startup messages written to the console when
     ErrorLogFormat is used.  [Jeff Trawick]

  *) mod_auth_digest: Be more specific when the realm mismatches because the
     realm has not been specified. [Graham Leggett]

  *) mod_proxy: Add a note in the balancer manager stating whether changes
     will or will not be persisted and whether settings are inherited.
     [Daniel Ruggeri, Jim Jagielski]

  *) mod_cache: Avoid a crash with strcmp() when the hostname is not provided.
     [Graham Leggett]

  *) core: Add util_fcgi.h and associated definitions and support
     routines for FastCGI, based largely on mod_proxy_fcgi.
     [Jeff Trawick]

  *) mod_headers: Add 'Header note header-name note-name' for copying a response
     headers value into a note. [Eric Covener]

  *) mod_headers: Add 'setifempty' command to Header and RequestHeader.
     [Eric Covener]

  *) mod_logio: new format-specifier %S (sum) which is the sum of received
     and sent byte counts.
     Bug 54015 [Christophe Jaillet]

  *) mod_deflate: Improve error detection when decompressing request bodies
     with trailing garbage: handle case where trailing bytes are in
     the same bucket. [Rainer Jung]

  *) mod_authz_groupfile, mod_authz_user: Reduce severity of AH01671 and AH01663
     from ERROR to DEBUG, since these modules do not know what mod_authz_core
     is doing with their AUTHZ_DENIED return value. [Eric Covener]

  *) mod_ldap: add TRACE5 for LDAP retries. [Eric Covener]

  *) mod_ldap: retry on an LDAP timeout during authn. [Eric Covener]

  *) mod_ldap: Change "LDAPReferrals off" to actually set the underlying LDAP
     SDK option to OFF, and introduce "LDAPReferrals default" to take the SDK
     default, sans rebind authentication callback.
     [Jan Kaluza <kaluze AT redhat.com>]

  *) core: Log a message at TRACE1 when the client aborts a connection.
     [Eric Covener]

  *) WinNT MPM: Don't crash during child process initialization if the
     Listen protocol is unrecognized.  [Jeff Trawick]

  *) modules: Fix some compiler warnings. [Guenter Knauf]

  *) Sync 2.4 and trunk
       - Avoid some memory allocation and work when TRACE1 is not activated
       - fix typo in include guard
       - indent
       - No need to lower the string before removing the path, it is just a waste of time...
       - Save a few cycles
     [Christophe Jaillet <christophe.jaillet wanadoo.fr>]

  *) mod_filter: Add "change=no" as a proto-flag to FilterProtocol
     to remove a providers initial flags set at registration time.
     [Eric Covener]

  *) core, mod_ssl: Enable the ability for a module to reverse the sense of
     a poll event from a read to a write or vice versa. This is a step on
     the way to allow mod_ssl taking full advantage of the event MPM.
     [Graham Leggett]

  *) Makefile.win: Install proper pcre DLL file during debug build install.
     Bug 55235.  [Ben Reser <ben reser org>]

  *) mod_ldap: Fix a potential memory leak or corruption.  Bug 54936.
     [Zhenbo Xu <zhenbo1987 gmail com>]

  *) ab: Fix potential buffer overflows when processing the T and X
     command-line options.  Bug 55360.
     [Mike Rumph <mike.rumph oracle.com>]

  *) fcgistarter: Specify SO_REUSEADDR to allow starting a server
     with old connections in TIME_WAIT.  [Jeff Trawick]

  *) core: Add open_htaccess hook which, in conjunction with dirwalk_stat
     and post_perdir_config (introduced in 2.4.5), allows mpm-itk to be
     used without patches to httpd core. [Stefan Fritsch]

  *) support/htdbm: fix processing of -t command line switch. Regression
     introduced in 2.4.4
     Bug 55264 [Jo Rhett <jrhett netconsonance com>]


  [Apache 2.3.0-dev includes those bug fixes and changes with the
   Apache 2.2.xx tree as documented, and except as noted, below.]

Changes with Apache 2.2.x and later:

  *) http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/CHANGES?view=markup

Changes with Apache 2.0.x and later:

  *) http://svn.apache.org/viewvc/httpd/httpd/branches/2.0.x/CHANGES?view=markup

Revision 1.9.2.1 / (download) - annotate - [select for diffs], Tue Jul 30 20:17:50 2013 UTC (6 years, 2 months ago) by tron
Branch: pkgsrc-2013Q2
Changes since 1.9: +4 -9 lines
Diff to previous 1.9 (colored) next main 1.10 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #4193 - requested by ryoon
www/apache24: security update

Revisions pulled up:
- www/apache24/Makefile                                         1.21 via patch
- www/apache24/PLIST                                            1.11
- www/apache24/distinfo                                         1.10
- www/apache24/patches/patch-support_htdbm.c                    deleted
- www/apache24/patches/patch-support_htdigest.c                 deleted
- www/apache24/patches/patch-support_htpasswd.c                 deleted
- www/apache24/patches/patch-support_passwd__common.c           deleted
- www/apache24/patches/patch-support_passwd__common.h           deleted

---
   Module Name:	pkgsrc
   Committed By:	ryoon
   Date:		Tue Jul 30 12:51:29 UTC 2013

   Modified Files:
   	pkgsrc/www/apache24: Makefile PLIST distinfo
   Removed Files:
   	pkgsrc/www/apache24/patches: patch-support_htdbm.c
   	    patch-support_htdigest.c patch-support_htpasswd.c
   	    patch-support_passwd__common.c patch-support_passwd__common.h

   Log Message:
   Update to 2.4.6

   Changelog:
   Security buxfixes.
       SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.
       SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that dirty flag is respected when saving sessions, and ensure the session ID is changed each time the session changes. This changes the format of the updatesession SQL statement. Existing configurations must be changed.

   And feature enhancement and bugfixes.

Revision 1.10 / (download) - annotate - [select for diffs], Tue Jul 30 12:51:29 2013 UTC (6 years, 2 months ago) by ryoon
Branch: MAIN
CVS Tags: pkgsrc-2013Q3-base, pkgsrc-2013Q3
Changes since 1.9: +4 -9 lines
Diff to previous 1.9 (colored) to selected 1.14.2.1 (colored)

Update to 2.4.6

Changelog:
Security buxfixes.
    SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.
    SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that dirty flag is respected when saving sessions, and ensure the session ID is changed each time the session changes. This changes the format of the updatesession SQL statement. Existing configurations must be changed.

And feature enhancement and bugfixes.

Revision 1.9 / (download) - annotate - [select for diffs], Thu Jun 20 09:06:45 2013 UTC (6 years, 3 months ago) by taca
Branch: MAIN
CVS Tags: pkgsrc-2013Q2-base
Branch point for: pkgsrc-2013Q2
Changes since 1.8: +6 -1 lines
Diff to previous 1.8 (colored) to selected 1.14.2.1 (colored)

Add fixes a problem of htpasswd creating wrong password entry when
specifying password from tty or standard input.

Reported as a bug: https://issues.apache.org/bugzilla/show_bug.cgi?id=54735.
Use patch from http://people.apache.org/~rjung/patches/2.4-htpass.patch.

Bump PKGREVISION.

Revision 1.8 / (download) - annotate - [select for diffs], Tue Jun 4 22:08:20 2013 UTC (6 years, 4 months ago) by fhajny
Branch: MAIN
Changes since 1.7: +2 -1 lines
Diff to previous 1.7 (colored) to selected 1.14.2.1 (colored)

Disable dtrace option as it's not actually implemented properly
(even though advertised by configure). Do not break 3rd party modules that
may have DTrace implemented perfectly well.

Bump PKGREVISION.

Revision 1.6.4.1 / (download) - annotate - [select for diffs], Wed Feb 27 09:37:43 2013 UTC (6 years, 7 months ago) by tron
Branch: pkgsrc-2012Q4
Changes since 1.6: +7 -7 lines
Diff to previous 1.6 (colored) next main 1.7 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #4081 - requested by ryoon
www/apache24: security update

Revisions pulled up:
- www/apache24/Makefile                                         1.15 via patch
- www/apache24/PLIST                                            1.9
- www/apache24/distinfo                                         1.7
- www/apache24/patches/patch-ad                                 1.2
- www/apache24/patches/patch-ag                                 1.2
- www/apache24/patches/patch-modules_ssl_ssl__private.h         1.3

---
   Module Name:	pkgsrc
   Committed By:	ryoon
   Date:		Mon Feb 25 21:16:38 UTC 2013

   Modified Files:
   	pkgsrc/www/apache24: Makefile PLIST distinfo
   	pkgsrc/www/apache24/patches: patch-ad patch-ag
   	    patch-modules_ssl_ssl__private.h

   Log Message:
   Update to 2.4.4

   Changelog:
   Fix the following security bugs.
       SECURITY: CVE-2012-3499 (cve.mitre.org) Various XSS flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.
       SECURITY: CVE-2012-4558 (cve.mitre.org) XSS in mod_proxy_balancer manager interface.

Revision 1.7 / (download) - annotate - [select for diffs], Mon Feb 25 21:16:37 2013 UTC (6 years, 7 months ago) by ryoon
Branch: MAIN
CVS Tags: pkgsrc-2013Q1-base, pkgsrc-2013Q1
Changes since 1.6: +7 -7 lines
Diff to previous 1.6 (colored) to selected 1.14.2.1 (colored)

Update to 2.4.4

Changelog:
Fix the following security bugs.
    SECURITY: CVE-2012-3499 (cve.mitre.org) Various XSS flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.
    SECURITY: CVE-2012-4558 (cve.mitre.org) XSS in mod_proxy_balancer manager interface.

Revision 1.6 / (download) - annotate - [select for diffs], Sun Aug 26 12:37:34 2012 UTC (7 years, 1 month ago) by ryoon
Branch: MAIN
CVS Tags: pkgsrc-2012Q4-base, pkgsrc-2012Q3-base, pkgsrc-2012Q3
Branch point for: pkgsrc-2012Q4
Changes since 1.5: +4 -4 lines
Diff to previous 1.5 (colored) to selected 1.14.2.1 (colored)

Update to 2.4.3

* Fix security problems.
* Build three Multi-Processing Model shared libraries,
  and select default model with option
* Retire mod_cgi.so module, use mod_cgid.so; Add MESSAGE

Changelog:

Changes with Apache 2.4.3

  *) SECURITY: CVE-2012-3502  (cve.mitre.org)
     mod_proxy_ajp, mod_proxy_http: Fix an issue in back end
     connection closing which could lead to privacy issues due
     to a response mixup. PR 53727. [Rainer Jung]

  *) SECURITY: CVE-2012-2687 (cve.mitre.org)
     mod_negotiation: Escape filenames in variant list to prevent an
     possible XSS for a site where untrusted users can upload files to
     a location with MultiViews enabled. [Niels Heinen <heinenn google.com>]

  *) mod_authnz_ldap: Don't try a potentially expensive nested groups
     search before exhausting all AuthLDAPGroupAttribute checks on the
     current group. PR 52464 [Eric Covener]

  *) mod_lua: Add new directive LuaAuthzProvider to allow implementing an
     authorization provider in lua. [Stefan Fritsch]

  *) core: Be less strict when checking whether Content-Type is set to
     "application/x-www-form-urlencoded" when parsing POST data,
     or we risk losing data with an appended charset. PR 53698
     [Petter Berntsen <petterb gmail.com>]

  *) httpd.conf: Added configuration directives to set a bad_DNT environment
     variable based on User-Agent and to remove the DNT header field from
     incoming requests when a match occurs. This currently has the effect of
     removing DNT from requests by MSIE 10.0 because it deliberately violates
     the current specification of DNT semantics for HTTP. [Roy T. Fielding]

  *) mod_socache_shmcb: Fix bus error due to a misalignment
     in some 32 bit builds, especially on Solaris Sparc.
     PR 53040.  [Rainer Jung]

  *) mod_cache: Set content type in case we return stale content.
     [Ruediger Pluem]

  *) Windows: Fix SSL failures on windows with AcceptFilter https none.
     PR 52476.  [Jeff Trawick]

  *) ab: Fix read failure when targeting SSL server.  [Jeff Trawick]

  *) The following now respect DefaultRuntimeDir/DEFAULT_REL_RUNTIMEDIR:
     - mod_auth_digest: shared memory file
     [Jeff Trawick]

  *) htpasswd: Use correct file mode for checking if file is writable.
     PR 45923. [Stefan Fritsch]

  *) mod_rewrite: Fix crash with dbd RewriteMaps. PR 53663. [Mikhail T.
     <mi apache aldan algebra com>]

  *) mod_ssl: Add new directive SSLCompression to disable TLS-level
     compression. PR 53219. [Björn Jacke <bjoern j3e de>, Stefan Fritsch]

  *) mod_lua: Add a few missing request_rec fields. Rename remote_ip to
     client_ip to match conn_rec. [Stefan Fritsch]

  *) mod_lua: Change prototype of vm_construct, to work around gcc bug which
     causes a segfault. PR 52779. [Dick Snippe <Dick Snippe tech omroep nl>]

  *) mpm_event: Don't count connections in lingering close state when
     calculating how many additional connections may be accepted.
     [Stefan Fritsch]

  *) mod_ssl: If exiting during initialization because of a fatal error,
     log a message to the main error log pointing to the appropriate
     virtual host error log. [Stefan Fritsch]

  *) mod_proxy_ajp: Reduce memory usage in case of many keep-alive requests on
     one connection. PR 52275. [Naohiro Ooiwa <naohiro ooiwa miraclelinux com>]

  *) mod_proxy_balancer: Restore balancing after a failed worker has
     recovered when using lbmethod_bybusyness.  PR 48735.  [Jeff Trawick]

  *) mod_setenvif: Compile some global regex only once during startup.
     This should save some memory, especially with .htaccess.
     [Stefan Fritsch]

  *) core: Add the port number to the vhost's name in the scoreboard.
     [Stefan Fritsch]

  *) mod_proxy: Fix ProxyPassReverse for balancer configurations.
     PR 45434.  [Joe Orton]

  *) mod_lua: Add the parsebody function for parsing POST data. PR 53064.
     [Daniel Gruno]

  *) apxs: Use LDFLAGS from config_vars.mk in addition to CFLAGS and CPPFLAGS.
     [Stefan Fritsch]

  *) mod_proxy: Fix memory leak or possible corruption in ProxyBlock
     implementation.  [Ruediger Pluem, Joe Orton]

  *) mod_proxy: Check hostname from request URI against ProxyBlock list,
     not forward proxy, if ProxyRemote* is configured.  [Joe Orton]

  *) mod_proxy_connect: Avoid DNS lookup on hostname from request URI
     if ProxyRemote* is configured.  PR 43697.  [Joe Orton]

  *) mpm_event, mpm_worker: Remain active amidst prevalent child process
     resource shortages.  [Jeff Trawick]

  *) Add "strict" and "warnings" pragmas to Perl scripts.  [Rich Bowen]

  *) The following now respect DefaultRuntimeDir/DEFAULT_REL_RUNTIMEDIR:
     - core: the scoreboard (ScoreBoardFile), pid file (PidFile), and
       mutexes (Mutex)
     [Jim Jagielski]

  *) ab: Fix bind() errors.  [Joe Orton]

  *) mpm_event: Don't do a blocking write when starting a lingering close
     from the listener thread. PR 52229. [Stefan Fritsch]

  *) mod_so: If a filename without slashes is specified for LoadFile or
     LoadModule and the file cannot be found in the server root directory,
     try to use the standard dlopen() search path. [Stefan Fritsch]

  *) mpm_event, mpm_worker: Fix cases where the spawn rate wasn't reduced
     after child process resource shortages.  [Jeff Trawick]

  *) mpm_prefork: Reduce spawn rate after a child process exits due to
     unexpected poll or accept failure.  [Jeff Trawick]

  *) core: Log value of Status header line in script responses rather
     than the fixed header name.  [Chris Darroch]

  *) mpm_ssl: Fix handling of empty response from OCSP server.
     [Jim Meyering <meyering redhat.com>, Joe Orton]

  *) mpm_event: Fix handling of MaxConnectionsPerChild. [Stefan Fritsch]

  *) mod_authz_core: If an expression in "Require expr" returns denied and
     references %{REMOTE_USER}, trigger authentication and retry. PR 52892.
     [Stefan Fritsch]

  *) core: Always log if LimitRequestFieldSize triggers.  [Stefan Fritsch]

  *) mod_deflate: Skip compression if compression is enabled at SSL level.
     [Stefan Fritsch]

  *) core: Add missing HTTP status codes registered with IANA.
     [Julian Reschke <julian.reschke gmx.de>, Rainer Jung]

  *) mod_ldap: Treat the "server unavailable" condition as a transient
     error with all LDAP SDKs.  [Filip Valder <filip.valder vsb.cz>]

  *) core: Fix spurious "not allowed here" error returned when the Options
     directive is used in .htaccess and "AllowOverride Options" (with no
     specific options restricted) is configured.  PR 53444. [Eric Covener]

  *) mod_authz_core: Fix parsing of Require arguments in <AuthzProviderAlias>.
     PR 53048. [Stefan Fritsch]

  *) mod_log_config: Fix %{abc}C truncating cookie values at first "=".
     PR 53104. [Greg Ames]

  *) mod_ext_filter: Fix error_log spam when input filters are configured.
     [Joe Orton]

  *) mod_rewrite: Add "AllowAnyURI" option. PR 52774. [Joe Orton]

  *) htdbm, htpasswd: Don't crash if crypt() fails (e.g. with FIPS enabled).
     [Paul Wouters <pwouters redhat.com>, Joe Orton]

  *) core: Use a TLS 1.0 close_notify alert for internal dummy connection if
     the chosen listener is configured for https. [Joe Orton]

  *) mod_proxy: Use the the same hostname for SNI as for the HTTP request when
     forwarding to SSL backends. PR 53134.
     [Michael Weiser <michael weiser.dinsnail.net>, Ruediger Pluem]

  *) mod_info: Display all registered providers. [Stefan Fritsch]

  *) mod_ssl: Send the error message for speaking http to an https port using
     HTTP/1.0 instead of HTTP/0.9, and omit the link that may be wrong when
     using SNI. PR 50823. [Stefan Fritsch]

  *) core: Fix segfault in logging if r->useragent_addr or c->client_addr is
     unset. PR 53265. [Stefan Fritsch]

  *) log_server_status: Bring Perl style forward to the present, use
     standard modules, update for new format of server-status output.
     PR 45424. [Richard Bowen, Dave Brondsema, and others]

  *) mod_sed, mod_log_debug, mod_rewrite: Symbol namespace cleanups.
     [Joe Orton, André Malo]

  *) core: Prevent "httpd -k restart" from killing server in presence of
     config error. [Joe Orton]

  *) mod_proxy_fcgi: If there is an error reading the headers from the
     backend, send an error to the client. PR 52879. [Stefan Fritsch]

Revision 1.3.2.1 / (download) - annotate - [select for diffs], Sat Jul 7 17:59:51 2012 UTC (7 years, 3 months ago) by tron
Branch: pkgsrc-2012Q2
Changes since 1.3: +2 -1 lines
Diff to previous 1.3 (colored) next main 1.4 (colored) to selected 1.14.2.1 (colored)

Pullup ticket #3853 - requested by ryoon
www/apache24: bug fix

Revisions pulled up:
- www/apache24/Makefile                                         1.8
- www/apache24/distinfo                                         1.4
- www/apache24/patches/patch-modules_ssl_ssl__private.h         1.1

---
   Module Name:	pkgsrc
   Committed By:	ryoon
   Date:		Thu Jul  5 12:50:44 UTC 2012

   Modified Files:
   	pkgsrc/www/apache24: Makefile distinfo
   Added Files:
   	pkgsrc/www/apache24/patches: patch-modules_ssl_ssl__private.h

   Log Message:
   Bump PKGREVISION

   Fix PR pkg/46655.

   With NetBSD current and 6.0's OpenSSL, OPENSSL_NO_SSL_INTERN should not
   be defined, due to it lacks some functions.
   Exclude version 0x10001000 from OPENSSL_NO_SSL_INTERN definition.

Revision 1.5 / (download) - annotate - [select for diffs], Thu Jul 5 13:11:24 2012 UTC (7 years, 3 months ago) by ryoon
Branch: MAIN
Changes since 1.4: +2 -2 lines
Diff to previous 1.4 (colored) to selected 1.14.2.1 (colored)

Note upstream bug report URL.

Revision 1.4 / (download) - annotate - [select for diffs], Thu Jul 5 12:50:44 2012 UTC (7 years, 3 months ago) by ryoon
Branch: MAIN
Changes since 1.3: +2 -1 lines
Diff to previous 1.3 (colored) to selected 1.14.2.1 (colored)

Bump PKGREVISION

Fix PR pkg/46655.

With NetBSD current and 6.0's OpenSSL, OPENSSL_NO_SSL_INTERN should not
be defined, due to it lacks some functions.
Exclude version 0x10001000 from OPENSSL_NO_SSL_INTERN definition.

Revision 1.3 / (download) - annotate - [select for diffs], Fri May 18 20:56:28 2012 UTC (7 years, 5 months ago) by ryoon
Branch: MAIN
CVS Tags: pkgsrc-2012Q2-base
Branch point for: pkgsrc-2012Q2
Changes since 1.2: +2 -1 lines
Diff to previous 1.2 (colored) to selected 1.14.2.1 (colored)

Bump PKGREVISION.

Fix PR pkg/46458

* Fix download delay problem
  https://issues.apache.org/bugzilla/show_bug.cgi?id=53253

Revision 1.2 / (download) - annotate - [select for diffs], Wed Apr 18 11:27:01 2012 UTC (7 years, 6 months ago) by ryoon
Branch: MAIN
Changes since 1.1: +4 -4 lines
Diff to previous 1.1 (colored) to selected 1.14.2.1 (colored)

Update to 2.4.2

* Disable mod_proxy_html explicitly.

Changes with Apache 2.4.2

  *) SECURITY: CVE-2012-0883 (cve.mitre.org)
     envvars: Fix insecure handling of LD_LIBRARY_PATH that could lead to the
     current working directory to be searched for DSOs. [Stefan Fritsch]

  *) mod_slotmem_shm: Honor DefaultRuntimeDir [Jim Jagielski]

  *) mod_ssl: Fix crash with threaded MPMs due to race condition when
     initializing EC temporary keys. [Stefan Fritsch]

  *) mod_proxy: Add the forcerecovery balancer parameter that determines if
     recovery for balancer workers is enforced. [Ruediger Pluem]

  *) Fix MPM DSO load failure on AIX.  [Jeff Trawick]

  *) mod_proxy: Correctly set up reverse proxy worker. PR 52935.
     [Petter Berntsen <petterb gmail.com>]

  *) mod_sed: Don't define PATH_MAX to a potentially undefined value, causing
     compile problems on GNU hurd. [Stefan Fritsch]

  *) core: Add ap_runtime_dir_relative() and DefaultRuntimeDir.
     [Jeff Trawick]

  *) core: Fix breakage of Listen directives with MPMs that use a
     per-directory config. PR 52904. [Stefan Fritsch]

  *) core: Disallow directives in AllowOverrideList which are only allowed
     in VirtualHost or server context. These are usually not prepared to be
     called in .htaccess files. [Stefan Fritsch]

  *) core: In AllowOverrideList, do not allow 'None' together with other
     directives. PR 52823. [Stefan Fritsch]

  *) mod_slotmem_shm: Support DEFAULT_REL_RUNTIMEDIR for file-based shm.
     [Jim Jagielski]

  *) core: Fix merging of AllowOverrideList and ContentDigest.
     [Stefan Fritsch]

  *) mod_request: Fix validation of the KeptBodySize argument so it
     doesn't always throw a configuration error. PR 52981 [Eric Covener]

  *) core: Add filesystem paths to access denied / access failed messages
     AH00035 and AH00036. [Eric Covener]

  *) mod_dumpio: Properly handle errors from subsequent input filters.
     PR 52914. [Stefan Fritsch]

  *) Unix MPMs: Fix small memory leak in parent process if connect()
     failed when waking up children.  [Joe Orton]

  *) "DirectoryIndex disabled" now undoes DirectoryIndex settings in
     the current configuration section, not just previous config sections.
     PR 52845. [Eric Covener]

  *) mod_xml2enc: Fix broken handling of EOS buckets which could lead to
     response headers not being sent. PR 52766. [Stefan Fritsch]

  *) mod_ssl: Properly free the GENERAL_NAMEs. PR 32652. [Kaspar Brand]

  *) core: Check during config test that directories for the access
     logs actually exist. PR 29941. [Stefan Fritsch]

  *) mod_xml2enc, mod_proxy_html: Enable per-module loglevels.
     [Stefan Fritsch]

  *) mod_filter: Fix segfault with AddOutputFilterByType. PR 52755.
     [Stefan Fritsch]

  *) mod_session: Sessions are encoded as application/x-www-form-urlencoded
     strings, however we do not handle the encoding of spaces properly.
     Fixed. [Graham Leggett]

  *) Configuration: Example in comment should use a path consistent
     with the default configuration. PR 52715.
     [Rich Bowen, Jens Schleusener, Rainer Jung]

  *) Configuration: Switch documentation links from trunk to 2.4.
     [Rainer Jung]

  *) configure: Fix out of tree build using apr and apr-util in srclib.
     [Rainer Jung]

Revision 1.1.1.1 / (download) - annotate - [select for diffs] (vendor branch), Fri Apr 13 18:50:49 2012 UTC (7 years, 6 months ago) by ryoon
Branch: TNF
CVS Tags: pkgsrc-base
Changes since 1.1: +0 -0 lines
Diff to previous 1.1 (colored) to selected 1.14.2.1 (colored)

Import apache-2.4.1 as www/apache24.

The Apache HTTP Server Project is an effort to develop and maintain an
open-source HTTP server for various modern desktop and server operating
systems, such as UNIX and Windows NT.  The goal of this project is to
provide a secure, efficient and extensible server which provides HTTP
services in sync with the current HTTP standards.

This package tracks 2.4.x release.

Revision 1.1 / (download) - annotate - [select for diffs], Fri Apr 13 18:50:49 2012 UTC (7 years, 6 months ago) by ryoon
Branch: MAIN
Diff to selected 1.14.2.1 (colored)

Initial revision

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.




CVSweb <webmaster@jp.NetBSD.org>