pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/www/apache22 Add patch from the Apache SVN repository ...
details: https://anonhg.NetBSD.org/pkgsrc/rev/c85cebe1fe2a
branches: trunk
changeset: 565690:c85cebe1fe2a
user: tron <tron%pkgsrc.org@localhost>
date: Sun Oct 04 12:21:34 2009 +0000
description:
Add patch from the Apache SVN repository to the vulnerability reported
in CVE-2009-3095.
diffstat:
www/apache22/Makefile | 4 ++--
www/apache22/distinfo | 4 ++--
www/apache22/patches/patch-ab | 33 +++++++++++++++++++++++----------
3 files changed, 27 insertions(+), 14 deletions(-)
diffs (101 lines):
diff -r ed39a72b4e78 -r c85cebe1fe2a www/apache22/Makefile
--- a/www/apache22/Makefile Sun Oct 04 01:28:15 2009 +0000
+++ b/www/apache22/Makefile Sun Oct 04 12:21:34 2009 +0000
@@ -1,8 +1,8 @@
-# $NetBSD: Makefile,v 1.51 2009/09/14 22:09:33 tron Exp $
+# $NetBSD: Makefile,v 1.52 2009/10/04 12:21:34 tron Exp $
DISTNAME= httpd-2.2.13
PKGNAME= ${DISTNAME:S/httpd/apache/}
-PKGREVISION= 2
+PKGREVISION= 3
CATEGORIES= www
MASTER_SITES= ${MASTER_SITE_APACHE:=httpd/} \
${MASTER_SITE_APACHE:=httpd/old/}
diff -r ed39a72b4e78 -r c85cebe1fe2a www/apache22/distinfo
--- a/www/apache22/distinfo Sun Oct 04 01:28:15 2009 +0000
+++ b/www/apache22/distinfo Sun Oct 04 12:21:34 2009 +0000
@@ -1,10 +1,10 @@
-$NetBSD: distinfo,v 1.26 2009/09/14 22:09:33 tron Exp $
+$NetBSD: distinfo,v 1.27 2009/10/04 12:21:34 tron Exp $
SHA1 (httpd-2.2.13.tar.bz2) = 44d85da1b8e6c579d4514cfefbea00b284717b69
RMD160 (httpd-2.2.13.tar.bz2) = 4a6a2247cc118175a9a36f1e14344ee71da24627
Size (httpd-2.2.13.tar.bz2) = 5300199 bytes
SHA1 (patch-aa) = 40f5f687a1217b8d6684dc610d3d4c430f635cbf
-SHA1 (patch-ab) = 4427989bec4faadbd64c46dced5e57b4d6649270
+SHA1 (patch-ab) = 6aec00f6dc38eee2e8648b4e95df3dbf166ac548
SHA1 (patch-ac) = 515043b5c215d49fe8f6d3191b502c978e2a2dad
SHA1 (patch-ad) = 088d6ff0e7a8acfe70b4f85a6ce58d42c935fd13
SHA1 (patch-ae) = 86b307d6eefef232b6223afc3f69e64be40bd913
diff -r ed39a72b4e78 -r c85cebe1fe2a www/apache22/patches/patch-ab
--- a/www/apache22/patches/patch-ab Sun Oct 04 01:28:15 2009 +0000
+++ b/www/apache22/patches/patch-ab Sun Oct 04 12:21:34 2009 +0000
@@ -1,12 +1,13 @@
-$NetBSD: patch-ab,v 1.13 2009/09/14 22:09:33 tron Exp $
+$NetBSD: patch-ab,v 1.14 2009/10/04 12:21:35 tron Exp $
-Fix for CVE-2009-3094 taken from the Apache SVN repository:
+Fixes for CVE-2009-3094 and CVE-2009-3095 taken from the Apache SVN repository:
-http://svn.apache.org/viewvc?view=rev&revision=814652
+http://svn.apache.org/viewvc?view=rev&revision=814844
+http://svn.apache.org/viewvc?view=rev&revision=814847
---- modules/proxy/mod_proxy_ftp.c 2009/09/14 14:15:34 814651
-+++ modules/proxy/mod_proxy_ftp.c 2009/09/14 14:16:14 814652
-@@ -683,6 +683,31 @@
+--- modules/proxy/mod_proxy_ftp.c.orig 2008-11-11 20:04:34.000000000 +0000
++++ modules/proxy/mod_proxy_ftp.c 2009-10-04 12:49:43.000000000 +0100
+@@ -604,6 +604,31 @@
return APR_SUCCESS;
}
@@ -38,7 +39,19 @@
/*
* Generic "send FTP command to server" routine, using the control socket.
* Returns the FTP returncode (3 digit code)
-@@ -1296,26 +1321,11 @@
+@@ -887,6 +912,11 @@
+ if ((password = apr_table_get(r->headers_in, "Authorization")) != NULL
+ && strcasecmp(ap_getword(r->pool, &password, ' '), "Basic") == 0
+ && (password = ap_pbase64decode(r->pool, password))[0] != ':') {
++ /* Check the decoded string for special characters. */
++ if (!ftp_check_string(password)) {
++ return ap_proxyerror(r, HTTP_BAD_REQUEST,
++ "user credentials contained invalid character");
++ }
+ /*
+ * Note that this allocation has to be made from r->connection->pool
+ * because it has the lifetime of the connection. The other
+@@ -1210,26 +1240,11 @@
return ftp_proxyerror(r, backend, HTTP_BAD_GATEWAY, ftpmessage);
}
else if (rc == 229) {
@@ -68,7 +81,7 @@
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
"proxy: FTP: EPSV contacting remote host on port %d",
-@@ -1356,10 +1366,6 @@
+@@ -1272,10 +1287,6 @@
connect = 1;
}
}
@@ -79,7 +92,7 @@
}
}
-@@ -1446,10 +1452,6 @@
+@@ -1364,10 +1375,6 @@
connect = 1;
}
}
@@ -90,7 +103,7 @@
}
}
/*bypass:*/
-@@ -1929,7 +1931,9 @@
+@@ -1851,7 +1858,9 @@
* for a slow client to eat these bytes
*/
ap_flush_conn(data);
Home |
Main Index |
Thread Index |
Old Index