Commit Graph

524 Commits

Author SHA256 Message Date
Ana Guerrero
1c7ff42df1 Accepting request 1166934 from Apache
OBS-URL: https://build.opensuse.org/request/show/1166934
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=208
2024-04-12 15:33:53 +00:00
David Anes
7ef8ed17b4 Accepting request 1165100 from home:adkorte:branches:Apache
- Update to 2.4.59:
  *) mod_deflate: Fixes and better logging for handling various
     error and edge cases. [Eric Covener, Yann Ylavic, Joe Orton,
     Eric Norris <enorris etsy.com>]
  *) Add CGIScriptTimeout to mod_cgi. [Eric Covener]
  *) mod_xml2enc: Tolerate libxml2 2.12.0 and later.  PR 68610
     [ttachi <tachihara AT hotmail.com>]
  *) mod_slotmem_shm: Use ap_os_is_path_absolute() to make it portable.
     [Jean-Frederic Clere]
  *) mod_ssl: Use OpenSSL-standard functions to assemble CA
     name lists for SSLCACertificatePath/SSLCADNRequestPath.
     Names will now be consistently sorted. PR 61574.
     [Joe Orton]
  *) mod_xml2enc: Update check to accept any text/ media type
     or any XML media type per RFC 7303, avoiding
     corruption of Microsoft OOXML formats.  PR 64339.
     [Joseph Heenan <joseph.heenan fintechlabs.io>, Joe Orton]
  *) mod_http2: v2.0.26 with the following fixes:
     - Fixed `Date` header on requests upgraded from HTTP/1.1 (h2c). Fixes
       <https://github.com/icing/mod_h2/issues/272>.
     - Fixed small memory leak in h2 header bucket free. Thanks to
       Michael Kaufmann for finding this and providing the fix.
  *) htcacheclean: In -a/-A mode, list all files per subdirectory
     rather than only one. PR 65091.
     [Artem Egorenkov <aegorenkov.91 gmail.com>]
  *) mod_ssl: SSLProxyMachineCertificateFile/Path may reference files
     which include CA certificates; those CA certs are treated as if
     configured with SSLProxyMachineCertificateChainFile.  [Joe Orton]
  *) htpasswd, htdbm, dbmmanage: Update help&docs to refer to
     "hashing", rather than "encrypting" passwords.
     [Michele Preziuso <mpreziuso kaosdynamics.com>]
  *) mod_ssl: Fix build with LibreSSL 2.0.7+. PR 64047.
     [Giovanni Bechis, Yann Ylavic]
  *) htpasswd: Add support for passwords using SHA-2.  [Joe Orton,
     Yann Ylavic]
  *) core: Allow mod_env to override system environment vars. [Joe Orton]
  *) Allow mod_dav_fs to tolerate race conditions between PROPFIND and an
     operation which removes a directory/file between apr_dir_read() and
     apr_stat(). Current behaviour is to abort the connection which seems
     inferior to tolerating (and logging) the error. [Joe Orton]
  *) mod_ldap: HTML-escape data in the ldap-status handler.
     [Eric Covener, Chamal De Silva]
  *) mod_ssl: Disable the OpenSSL ENGINE API when OPENSSL_NO_ENGINE is set.
     Allow for "SSLCryptoDevice builtin" if the ENGINE API is not available,
     notably with OpenSSL >= 3.  PR 68080.  [Yann Ylavic, Joe Orton]
  *) mod_ssl: Improve compatibility with OpenSSL 3, fix build warnings about
     deprecated ENGINE_ API, honor OPENSSL_API_COMPAT setting while defaulting
     to compatibitily with version 1.1.1 (including ENGINEs / SSLCryptoDevice).
     [Yann Ylavic]
  *) mod_ssl: release memory to the OS when needed. [Giovanni Bechis]
  *) mod_proxy: Ignore (and warn about) enablereuse=on for ProxyPassMatch when
     some dollar substitution (backreference) happens in the hostname or port
     part of the URL.  [Yann Ylavic]
  *) mod_proxy: Allow to set a TTL for how long DNS resolutions to backend
     systems are cached. [Yann Ylavic]
  *) mod_proxy: Add optional third argument for ProxyRemote, which
     configures Basic authentication credentials to pass to the remote
     proxy.  PR 37355.  [Joe Orton]

OBS-URL: https://build.opensuse.org/request/show/1165100
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=700
2024-04-11 19:35:33 +00:00
Ana Guerrero
d93fe72faa Accepting request 1152028 from Apache
OBS-URL: https://build.opensuse.org/request/show/1152028
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=207
2024-02-28 18:44:55 +00:00
David Anes
7270596621 Accepting request 1147806 from home:dimstar:rpm4.20:a
Prepare for RPM 4.20

OBS-URL: https://build.opensuse.org/request/show/1147806
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=698
2024-02-27 07:42:18 +00:00
Ana Guerrero
4ce22f1d2e Accepting request 1142753 from Apache
OBS-URL: https://build.opensuse.org/request/show/1142753
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=206
2024-01-30 17:24:56 +00:00
David Anes
539b1e985d Accepting request 1142224 from home:dirkmueller:Factory
- use grep -E for egrep

      characters on redirections without the "NE" flag.
  * CVE-2023-27522 [bsc#1209049]: mod_proxy_uwsgi HTTP response splitting
  * CVE-2023-25690 [bsc#1209047]: HTTP request splitting with mod_rewrite and mod_proxy
- Update to 2.4.56:
- Remove references to README.QUICKSTART and point them to
  to vendor specific directory /usr/etc/logrotate.d.
- Align some defaults in apache2-server-tuning.conf to upstream
  defaults:
  - httpd-2.4.x-fate317766-config-control-two-protocol-options.diff
  to honour net.core.somaxconn sysctl as the mandatory limit.
  the old value of 511 was never used as until v5.4-rc6 it was
  clamped to 128, in current kernels the default limit is 4096.
    and we should just set the value for the environment variable
    this type of map is present in the configuration.  PR62311.
    missed to signal it the normal way (eos buckets). Addresses github issues
    and https://github.com/icing/mod_h2/issues/170. [Stefan Eissing]
* %check: do not load all modules, just use default loadmodule.conf; some
- Add which and w3m as dependencies. poo#28406
- Replace references to /var/adm/fillup-templates with new
  * consider also case when hostname does return empty string or
- make the package runable on non systemd systems
- drop upstreamed patch:
- updated to 2.4.26: This release of Apache is a security, feature,
- update to 2.4.25: fixed several security issues (CVE-2016-8740,
  fixes and improvements of mod_http2 and other modules; see CHANGES
- verify tarball: added httpd*.bz2.asc, apache2.keyring and remove
- readd the support of multiple entries in APACHE_ACCESS_LOG
   * HttpExpectStrict - allow admin to control whether we must

OBS-URL: https://build.opensuse.org/request/show/1142224
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=696
2024-01-30 11:32:13 +00:00
Ana Guerrero
18f945721f Accepting request 1118995 from Apache
OBS-URL: https://build.opensuse.org/request/show/1118995
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=205
2023-10-22 19:01:19 +00:00
David Anes
c49461adb0 Accepting request 1118994 from home:david.anes:branches:Apache
- Update to 2.4.58:
  *) SECURITY: CVE-2023-45802: Apache HTTP Server: HTTP/2 stream
     memory not reclaimed right away on RST (cve.mitre.org)
     When a HTTP/2 stream was reset (RST frame) by a client, there
     was a time window were the request's memory resources were not
     reclaimed immediately. Instead, de-allocation was deferred to
     connection close. A client could send new requests and resets,
     keeping the connection busy and open and causing the memory
     footprint to keep on growing. On connection close, all resources
     were reclaimed, but the process might run out of memory before
     that.
     This was found by the reporter during testing of CVE-2023-44487
     (HTTP/2 Rapid Reset Exploit) with their own test client. During
     "normal" HTTP/2 use, the probability to hit this bug is very
     low. The kept memory would not become noticeable before the
     connection closes or times out.
     Users are recommended to upgrade to version 2.4.58, which fixes
     the issue.
     Credits: Will Dormann of Vul Labs
  *) SECURITY: CVE-2023-43622: Apache HTTP Server: DoS in HTTP/2 with
     initial windows size 0 (cve.mitre.org)
     An attacker, opening a HTTP/2 connection with an initial window
     size of 0, was able to block handling of that connection
     indefinitely in Apache HTTP Server. This could be used to
     exhaust worker resources in the server, similar to the well
     known "slow loris" attack pattern.
     This has been fixed in version 2.4.58, so that such connection
     are terminated properly after the configured connection timeout.
     This issue affects Apache HTTP Server: from 2.4.55 through
     2.4.57.

OBS-URL: https://build.opensuse.org/request/show/1118994
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=694
2023-10-19 14:44:15 +00:00
Ana Guerrero
d56320887e Accepting request 1104179 from Apache
OBS-URL: https://build.opensuse.org/request/show/1104179
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=204
2023-08-17 17:42:46 +00:00
David Anes
98cd467f8f Accepting request 1102468 from home:dstoecker
- Enable building of mod_md

OBS-URL: https://build.opensuse.org/request/show/1102468
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=692
2023-08-16 13:09:50 +00:00
Dominique Leuenberger
ce7cd40dd3 Accepting request 1078453 from Apache
OBS-URL: https://build.opensuse.org/request/show/1078453
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=203
2023-04-12 10:51:03 +00:00
David Anes
28fa74dd09 Accepting request 1077884 from home:adkorte:branches:Apache
OBS-URL: https://build.opensuse.org/request/show/1077884
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=690
2023-04-11 13:32:57 +00:00
Dominique Leuenberger
3350d002e4 Accepting request 1070268 from Apache
OBS-URL: https://build.opensuse.org/request/show/1070268
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=202
2023-03-11 17:22:05 +00:00
David Anes
b0646b6a0e Accepting request 1070261 from home:david.anes:branches:Apache
- This update fixes the following security issues:
  * CVE-2023-27522 [bsc#1209049]: mod_proxy_uwsgi HTTP response splitting 
  * CVE-2023-25690 [bsc#1209047]: HTTP request splitting with mod_rewrite and mod_proxy  
- Update to 2.4.56: 
    *) rotatelogs: Add -T flag to allow subsequent rotated logfiles to be
      truncated without the initial logfile being truncated.  [Eric Covener]
    *) mod_ldap: LDAPConnectionPoolTTL should accept negative values in order to
      allow connections of any age to be reused. Up to now, a negative value
      was handled as an error when parsing the configuration file.  PR 66421.
      [nailyk <bzapache nailyk.fr>, Christophe Jaillet]
    *) mod_proxy_ajp: Report an error if the AJP backend sends an invalid number
      of headers. [Ruediger Pluem]
    *) mod_md:
      - Enabling ED25519 support and certificate transparency information when
        building with libressl v3.5.0 and newer. Thanks to Giovanni Bechis.
      - MDChallengeDns01 can now be configured for individual domains.
        Thanks to Jérôme Billiras (@bilhackmac) for the initial PR.
      - Fixed a bug found by Jérôme Billiras (@bilhackmac) that caused the challenge
        teardown not being invoked as it should.
      [Stefan Eissing]
    *) mod_http2: client resets of HTTP/2 streams led to unwanted 500 errors
      reported in access logs and error documents. The processing of the
      reset was correct, only unneccesary reporting was caused.
      [Stefan Eissing]
    *) mod_proxy_uwsgi: Stricter backend HTTP response parsing/validation.
      [Yann Ylavic]

  * CVE-2022-37436 [bsc#1207251], mod_proxy backend HTTP response splitting
  * CVE-2022-36760 [bsc#1207250], mod_proxy_ajp Possible request smuggling
  * CVE-2006-20001 [bsc#1207247], mod_dav out of bounds read, or write of zero byte

OBS-URL: https://build.opensuse.org/request/show/1070261
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=688
2023-03-08 20:52:02 +00:00
Dominique Leuenberger
c17f45f66c Accepting request 1060992 from Apache
OBS-URL: https://build.opensuse.org/request/show/1060992
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=201
2023-01-26 13:23:47 +00:00
David Anes
05ed3ad0b8 Accepting request 1060991 from home:david.anes:branches:Apache
- This update fixes the following security issues:

OBS-URL: https://build.opensuse.org/request/show/1060991
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=686
2023-01-25 16:45:25 +00:00
David Anes
208a7dc602 Accepting request 1060983 from home:david.anes:branches:Apache
- This update fixes te following security issues.
  * fix CVE-2022-37436 [bsc#1207251], mod_proxy backend HTTP response splitting
  * fix CVE-2022-36760 [bsc#1207250], mod_proxy_ajp Possible request smuggling
  * fix CVE-2006-20001 [bsc#1207247], mod_dav out of bounds read, or write of zero byte

OBS-URL: https://build.opensuse.org/request/show/1060983
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=685
2023-01-25 16:37:03 +00:00
Dominique Leuenberger
a0a3cc81be Accepting request 1060451 from Apache
OBS-URL: https://build.opensuse.org/request/show/1060451
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=200
2023-01-24 18:42:19 +00:00
David Anes
0415ee3d0e Accepting request 1060450 from home:david.anes:branches:Apache
OBS-URL: https://build.opensuse.org/request/show/1060450
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=683
2023-01-23 15:33:33 +00:00
David Anes
7daefa5b80 Accepting request 1059452 from home:david.anes:branches:Apache
- Update to 2.4.55:
    *) SECURITY: CVE-2022-37436: Apache HTTP Server: mod_proxy prior to
      2.4.55 allows a backend to trigger HTTP response splitting
      (cve.mitre.org)
      Prior to Apache HTTP Server 2.4.55, a malicious backend can
      cause the response headers to be truncated early, resulting in
      some headers being incorporated into the response body. If the
      later headers have any security purpose, they will not be
      interpreted by the client.
      Credits: Dimas Fariski Setyawan Putra (@nyxsorcerer)
    *) SECURITY: CVE-2022-36760: Apache HTTP Server: mod_proxy_ajp
      Possible request smuggling (cve.mitre.org)
      Inconsistent Interpretation of HTTP Requests ('HTTP Request
      Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server
      allows an attacker to smuggle requests to the AJP server it
      forwards requests to.  This issue affects Apache HTTP Server
      Apache HTTP Server 2.4 version 2.4.54 and prior versions.
      Credits: ZeddYu_Lu from Qi'anxin Research Institute of Legendsec
      at Qi'anxin Group
    *) SECURITY: CVE-2006-20001: mod_dav out of  bounds read, or write
      of zero byte (cve.mitre.org)
      A carefully crafted If: request header can cause a memory read,
      or write of a single zero byte, in a pool (heap) memory location
      beyond the header value sent. This could cause the process to
      crash.
      This issue affects Apache HTTP Server 2.4.54 and earlier.
    *) mod_dav: Open the lock database read-only when possible.
      PR 36636 [Wilson Felipe <wfelipe gmail.com>, manu]
    *) mod_proxy_http2: apply the standard httpd content type handling
      to responses from the backend, as other proxy modules do. Fixes PR 66391.

OBS-URL: https://build.opensuse.org/request/show/1059452
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=682
2023-01-19 09:33:48 +00:00
Dominique Leuenberger
51daf9244c Accepting request 1043275 from Apache
OBS-URL: https://build.opensuse.org/request/show/1043275
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=199
2022-12-17 19:36:09 +00:00
David Anes
5c0c75bfa3 Accepting request 1043175 from home:dirkmueller:Factory
- switch to pkgconfig(zlib) so that alternative providers can be
  used

OBS-URL: https://build.opensuse.org/request/show/1043175
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=680
2022-12-16 07:31:14 +00:00
Dominique Leuenberger
c0c7b01325 Accepting request 1005552 from Apache
OBS-URL: https://build.opensuse.org/request/show/1005552
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=198
2022-09-25 13:34:17 +00:00
David Anes
2810d409b0 Accepting request 1005549 from home:coolo:branches:openSUSE:Factory
- The 2.4.54 release brought support for PCRE2, but for that we also
  need to change buildrequires to pcre2-devel

OBS-URL: https://build.opensuse.org/request/show/1005549
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=678
2022-09-23 06:20:26 +00:00
Dominique Leuenberger
fc36401836 Accepting request 1004996 from Apache
OBS-URL: https://build.opensuse.org/request/show/1004996
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=197
2022-09-21 12:41:49 +00:00
David Anes
c1ca068409 Accepting request 1004993 from home:david.anes:branches:Apache
- Remove references to README.QUICKSTART and point them to 
  https://en.opensuse.org/SDB:Apache_installation (bsc#1203573)

OBS-URL: https://build.opensuse.org/request/show/1004993
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=676
2022-09-20 15:10:26 +00:00
Dominique Leuenberger
868e46f071 Accepting request 1002993 from Apache
OBS-URL: https://build.opensuse.org/request/show/1002993
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=196
2022-09-13 13:07:54 +00:00
David Anes
c81902cbec Accepting request 1000574 from home:schubi2
- Migration to /usr/etc: Saving user changed configuration files
  in /etc and restoring them while an RPM update.

OBS-URL: https://build.opensuse.org/request/show/1000574
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=674
2022-09-12 14:19:14 +00:00
Dominique Leuenberger
2b5b9f5ff2 Accepting request 985733 from Apache
OBS-URL: https://build.opensuse.org/request/show/985733
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=195
2022-06-30 11:17:55 +00:00
David Anes
484c8c353a Accepting request 985724 from home:schubi2
- Moved logrotate files from user specific directory /etc/logrotate.d
  to vendor specific directory /usr/etc/logrotate.d.

OBS-URL: https://build.opensuse.org/request/show/985724
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=672
2022-06-29 09:30:56 +00:00
Dominique Leuenberger
d875c7dac7 Accepting request 981545 from Apache
OBS-URL: https://build.opensuse.org/request/show/981545
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=194
2022-06-13 11:01:51 +00:00
David Anes
e36de76227 Accepting request 981544 from home:david.anes:branches:Apache
Merge sroeder (details about CVEs) and pgajdos requests.

- update httpd-framework to svn revision 1898917

- version update to 2.4.54
  Changes with Apache 2.4.54
    *) SECURITY: CVE-2022-31813: mod_proxy X-Forwarded-For dropped by
       hop-by-hop mechanism (cve.mitre.org)
       Apache HTTP Server 2.4.53 and earlier may not send the
       X-Forwarded-* headers to the origin server based on client side
       Connection header hop-by-hop mechanism.
       This may be used to bypass IP based authentication on the origin
       server/application.
       Credits: The Apache HTTP Server project would like to thank
       Gaetan Ferry (Synacktiv) for reporting this issue
    *) SECURITY: CVE-2022-30556: Information Disclosure in mod_lua with
       websockets (cve.mitre.org)
       Apache HTTP Server 2.4.53 and earlier may return lengths to
       applications calling r:wsread() that point past the end of the
       storage allocated for the buffer.
       Credits: The Apache HTTP Server project would like to thank
       Ronald Crane (Zippenhop LLC) for reporting this issue
    *) SECURITY: CVE-2022-30522: mod_sed denial of service
       (cve.mitre.org)
       If Apache HTTP Server 2.4.53 is configured to do transformations
       with mod_sed in contexts where the input to mod_sed may be very
       large, mod_sed may make excessively large memory allocations and
       trigger an abort.
       Credits: This issue was found by Brian Moussalli from the JFrog
       Security Research team
    *) SECURITY: CVE-2022-29404: Denial of service in mod_lua
       r:parsebody (cve.mitre.org)

OBS-URL: https://build.opensuse.org/request/show/981544
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=670
2022-06-09 16:03:37 +00:00
Dominique Leuenberger
a542458269 Accepting request 961736 from Apache
OBS-URL: https://build.opensuse.org/request/show/961736
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=193
2022-03-15 18:04:18 +00:00
David Anes
76648b0e0d Accepting request 961683 from home:pgajdos
- httpd-framework updated to svn1898917
- deleted patches
  - apache-test-DirectorySlash-NotFound-logic.patch (upstreamed)
  - apache2-perl-io-socket.patch (upstreamed)

OBS-URL: https://build.opensuse.org/request/show/961683
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=668
2022-03-14 19:29:42 +00:00
David Anes
1dab303134 Accepting request 961671 from home:pgajdos
- version update to 2.4.53
  *) SECURITY: CVE-2022-23943: mod_sed: Read/write beyond bounds
     (cve.mitre.org)
     Out-of-bounds Write vulnerability in mod_sed of Apache HTTP
     Server allows an attacker to overwrite heap memory with possibly
     attacker provided data.
     This issue affects Apache HTTP Server 2.4 version 2.4.52 and
     prior versions.
     Credits: Ronald Crane (Zippenhop LLC)
  *) SECURITY: CVE-2022-22721: core: Possible buffer overflow with
     very large or unlimited LimitXMLRequestBody (cve.mitre.org)
     If LimitXMLRequestBody is set to allow request bodies larger
     than 350MB (defaults to 1M) on 32 bit systems an integer
     overflow happens which later causes out of bounds writes.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Anonymous working with Trend Micro Zero Day Initiative
  *) SECURITY: CVE-2022-22720: HTTP request smuggling vulnerability
     in Apache HTTP Server 2.4.52 and earlier (cve.mitre.org)
     Apache HTTP Server 2.4.52 and earlier fails to close inbound
     connection when errors are encountered discarding the request
     body, exposing the server to HTTP Request Smuggling
     Credits: James Kettle <james.kettle portswigger.net>
  *) SECURITY: CVE-2022-22719: mod_lua Use of uninitialized value of
     in r:parsebody (cve.mitre.org)
     A carefully crafted request body can cause a read to a random
     memory area which could cause the process to crash.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Chamal De Silva
  *) core: Make sure and check that LimitXMLRequestBody fits in system memory.
     [Ruediger Pluem, Yann Ylavic]

OBS-URL: https://build.opensuse.org/request/show/961671
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=667
2022-03-14 12:02:14 +00:00
Dominique Leuenberger
45237a9f55 Accepting request 950138 from Apache
- ssl-global.conf: set SSLCipherSuite to PROFILE=SYSTEM instead of
  DEFAULT_SUSE [jsc#SLE-22561]
- set also SSLProxyCipherSuite to PROFILE=SYSTEM
- modified sources
  % apache2-ssl-global.conf (forwarded request 949462 from pgajdos)

OBS-URL: https://build.opensuse.org/request/show/950138
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=192
2022-02-03 22:16:23 +00:00
26634a3d77 Accepting request 949462 from home:pgajdos
- ssl-global.conf: set SSLCipherSuite to PROFILE=SYSTEM instead of
  DEFAULT_SUSE [jsc#SLE-22561]
- set also SSLProxyCipherSuite to PROFILE=SYSTEM
- modified sources
  % apache2-ssl-global.conf

OBS-URL: https://build.opensuse.org/request/show/949462
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=666
2022-01-31 10:50:24 +00:00
Dominique Leuenberger
712ca1fb52 Accepting request 946161 from Apache
OBS-URL: https://build.opensuse.org/request/show/946161
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=191
2022-01-14 22:12:39 +00:00
David Anes
87eb553b4a Accepting request 945607 from home:david.anes:branches:Apache
Fix bsc#1194062 by using default upstream values for ServerLimit and MaxConnectionsPerChild

OBS-URL: https://build.opensuse.org/request/show/945607
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=665
2022-01-13 14:19:25 +00:00
Dominique Leuenberger
88d65b6db8 Accepting request 945511 from Apache
- Add apache2-perl-io-socket.patch: t/ssl/ocsp.t: Handle new error
  message raised by IO-Socket-SSL 2.073.

Fixes build with Perl-IO-socket-SSL 2.073, as currently staged in :E (forwarded request 945399 from dimstar)

OBS-URL: https://build.opensuse.org/request/show/945511
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=190
2022-01-11 20:17:23 +00:00
2312035f9b Accepting request 945375 from home:olh:branches:Apache
- remove instance units from post scripts, they can not be reloaded

OBS-URL: https://build.opensuse.org/request/show/945375
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=664
2022-01-11 07:57:05 +00:00
f7bd876f97 Accepting request 945399 from home:dimstar:Factory
- Add apache2-perl-io-socket.patch: t/ssl/ocsp.t: Handle new error
  message raised by IO-Socket-SSL 2.073.

Fixes build with Perl-IO-socket-SSL 2.073, as currently staged in :E

OBS-URL: https://build.opensuse.org/request/show/945399
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=663
2022-01-11 06:03:57 +00:00
Dominique Leuenberger
65d3e2aefa Accepting request 941819 from Apache
changlog update for 2.4.52:
CVE-2021-44224 boo#1193943
CVE-2021-44790 boo#1193942 (forwarded request 941816 from AndreasStieger)

OBS-URL: https://build.opensuse.org/request/show/941819
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=189
2021-12-21 17:40:22 +00:00
24717da42a Accepting request 941816 from home:AndreasStieger:branches:Apache
changlog update for 2.4.52:
CVE-2021-44224 boo#1193943
CVE-2021-44790 boo#1193942

OBS-URL: https://build.opensuse.org/request/show/941816
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=662
2021-12-21 10:28:15 +00:00
91179b73e4 OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=661 2021-12-20 12:19:54 +00:00
ce537de3bc Accepting request 941644 from home:david.anes:branches:Apache
Update to 2.4.52

OBS-URL: https://build.opensuse.org/request/show/941644
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=660
2021-12-20 11:46:23 +00:00
Dominique Leuenberger
6a1697c3d5 Accepting request 933435 from Apache
- httpd-framework updated to svn1894461
- added patches
  fix reverted logic, DirectorySlash NotFound is available in trunk only
  + apache-test-DirectorySlash-NotFound-logic.patch
- do not consider php tests, they do not run anyway

OBS-URL: https://build.opensuse.org/request/show/933435
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=188
2021-11-26 23:50:47 +00:00
7ee7d2c634 - httpd-framework updated to svn1894461
- added patches
  fix reverted logic, DirectorySlash NotFound is available in trunk only
  + apache-test-DirectorySlash-NotFound-logic.patch
- do not consider php tests, they do not run anyway

OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=659
2021-11-24 11:09:35 +00:00
Dominique Leuenberger
ac59b1d5d0 Accepting request 931489 from Apache
- add section for the 'event' MPM to apache2-server-tuning.conf (forwarded request 931327 from adkorte)

OBS-URL: https://build.opensuse.org/request/show/931489
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/apache2?expand=0&rev=187
2021-11-20 01:38:03 +00:00
0befcf8746 Accepting request 931327 from home:adkorte:branches:Apache
- add section for the 'event' MPM to apache2-server-tuning.conf

OBS-URL: https://build.opensuse.org/request/show/931327
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=658
2021-11-15 08:27:53 +00:00