Revisions of apache2
David Anes (david.anes)
accepted
request 1102468
from
Dirk Stoecker (dstoecker)
(revision 692)
- Enable building of mod_md
buildservice-autocommit
accepted
request 1078453
from
David Anes (david.anes)
(revision 691)
baserev update by copy to link target
buildservice-autocommit
accepted
request 1070268
from
David Anes (david.anes)
(revision 689)
baserev update by copy to link target
David Anes (david.anes)
accepted
request 1070261
from
David Anes (david.anes)
(revision 688)
- This update fixes the following security issues: * CVE-2023-27522 [bsc#1209049]: mod_proxy_uwsgi HTTP response splitting * CVE-2023-25690 [bsc#1209047]: HTTP request splitting with mod_rewrite and mod_proxy - Update to 2.4.56: *) rotatelogs: Add -T flag to allow subsequent rotated logfiles to be truncated without the initial logfile being truncated. [Eric Covener] *) mod_ldap: LDAPConnectionPoolTTL should accept negative values in order to allow connections of any age to be reused. Up to now, a negative value was handled as an error when parsing the configuration file. PR 66421. [nailyk <bzapache nailyk.fr>, Christophe Jaillet] *) mod_proxy_ajp: Report an error if the AJP backend sends an invalid number of headers. [Ruediger Pluem] *) mod_md: - Enabling ED25519 support and certificate transparency information when building with libressl v3.5.0 and newer. Thanks to Giovanni Bechis. - MDChallengeDns01 can now be configured for individual domains. Thanks to Jérôme Billiras (@bilhackmac) for the initial PR. - Fixed a bug found by Jérôme Billiras (@bilhackmac) that caused the challenge teardown not being invoked as it should. [Stefan Eissing] *) mod_http2: client resets of HTTP/2 streams led to unwanted 500 errors reported in access logs and error documents. The processing of the reset was correct, only unneccesary reporting was caused. [Stefan Eissing] *) mod_proxy_uwsgi: Stricter backend HTTP response parsing/validation. [Yann Ylavic] * CVE-2022-37436 [bsc#1207251], mod_proxy backend HTTP response splitting * CVE-2022-36760 [bsc#1207250], mod_proxy_ajp Possible request smuggling * CVE-2006-20001 [bsc#1207247], mod_dav out of bounds read, or write of zero byte
buildservice-autocommit
accepted
request 1060992
from
David Anes (david.anes)
(revision 687)
baserev update by copy to link target
David Anes (david.anes)
accepted
request 1060991
from
David Anes (david.anes)
(revision 686)
- This update fixes the following security issues:
David Anes (david.anes)
accepted
request 1060983
from
David Anes (david.anes)
(revision 685)
- This update fixes te following security issues. * fix CVE-2022-37436 [bsc#1207251], mod_proxy backend HTTP response splitting * fix CVE-2022-36760 [bsc#1207250], mod_proxy_ajp Possible request smuggling * fix CVE-2006-20001 [bsc#1207247], mod_dav out of bounds read, or write of zero byte
buildservice-autocommit
accepted
request 1060451
from
David Anes (david.anes)
(revision 684)
baserev update by copy to link target
David Anes (david.anes)
accepted
request 1059452
from
David Anes (david.anes)
(revision 682)
- Update to 2.4.55: *) SECURITY: CVE-2022-37436: Apache HTTP Server: mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response splitting (cve.mitre.org) Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client. Credits: Dimas Fariski Setyawan Putra (@nyxsorcerer) *) SECURITY: CVE-2022-36760: Apache HTTP Server: mod_proxy_ajp Possible request smuggling (cve.mitre.org) Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions. Credits: ZeddYu_Lu from Qi'anxin Research Institute of Legendsec at Qi'anxin Group *) SECURITY: CVE-2006-20001: mod_dav out of bounds read, or write of zero byte (cve.mitre.org) A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. *) mod_dav: Open the lock database read-only when possible. PR 36636 [Wilson Felipe <wfelipe gmail.com>, manu] *) mod_proxy_http2: apply the standard httpd content type handling to responses from the backend, as other proxy modules do. Fixes PR 66391.
buildservice-autocommit
accepted
request 1043275
from
David Anes (david.anes)
(revision 681)
baserev update by copy to link target
David Anes (david.anes)
accepted
request 1043175
from
Dirk Mueller (dirkmueller)
(revision 680)
- switch to pkgconfig(zlib) so that alternative providers can be used
buildservice-autocommit
accepted
request 1005552
from
David Anes (david.anes)
(revision 679)
baserev update by copy to link target
David Anes (david.anes)
accepted
request 1005549
from
Stephan Kulow (coolo)
(revision 678)
- The 2.4.54 release brought support for PCRE2, but for that we also need to change buildrequires to pcre2-devel
buildservice-autocommit
accepted
request 1004996
from
David Anes (david.anes)
(revision 677)
baserev update by copy to link target
David Anes (david.anes)
accepted
request 1004993
from
David Anes (david.anes)
(revision 676)
- Remove references to README.QUICKSTART and point them to https://en.opensuse.org/SDB:Apache_installation (bsc#1203573)
buildservice-autocommit
accepted
request 1002993
from
David Anes (david.anes)
(revision 675)
baserev update by copy to link target
David Anes (david.anes)
accepted
request 1000574
from
Stefan Schubert (schubi2)
(revision 674)
- Migration to /usr/etc: Saving user changed configuration files in /etc and restoring them while an RPM update.
buildservice-autocommit
accepted
request 985733
from
David Anes (david.anes)
(revision 673)
baserev update by copy to link target
Displaying revisions 21 - 40 of 712