343 Commits

Author SHA256 Message Date
38a6772ea1 Accepting request 1325322 from home:mschreiner:branches:Apache
- Include a sane HTTPD_SYSCONFIG_FILE env. variable when invoking
  /usr/sbin/httpd.
  The appropriate MPM was not being located when calling /usr/sbin/httpd
  directly.
- Rename event's 'mod_cgi' to 'mod_cgid' in loadmodule.conf, as that's what
  the event MPM ships.

OBS-URL: https://build.opensuse.org/request/show/1325322
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=733
2026-01-04 21:20:48 +00:00
180093ea5d Accepting request 1321598 from home:adkorte:branches:Apache
- version update to 2.4.66
  *) SECURITY: CVE-2025-66200: Apache HTTP Server: mod_userdir+suexec
     bypass via AllowOverride FileInfo (cve.mitre.org)
     mod_userdir+suexec bypass via AllowOverride FileInfo
     vulnerability in Apache HTTP Server. Users with access to use
     the RequestHeader directive in htaccess can cause some CGI
     scripts to run under an unexpected userid.
     This issue affects Apache HTTP Server: from 2.4.7 through
     2.4.65.
  *) SECURITY: CVE-2025-65082: Apache HTTP Server: CGI environment
     variable override (cve.mitre.org)
     Improper Neutralization of Escape, Meta, or Control Sequences
     vulnerability in Apache HTTP Server through environment
     variables set via the Apache configuration unexpectedly
     superseding variables calculated by the server for CGI programs.
     This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.
  *) SECURITY: CVE-2025-59775: Apache HTTP Server: NTLM Leakage on
     Windows through UNC SSRF (cve.mitre.org)
     Server-Side Request Forgery (SSRF) vulnerability
     Â in Apache HTTP Server on Windows
     with AllowEncodedSlashes On and MergeSlashes Off  allows to
     potentially leak NTLM
     hashes to a malicious server via SSRF and malicious requests or
     content
  *) SECURITY: CVE-2025-58098: Apache HTTP Server: Server Side
     Includes adds query string to #exec cmd=... (cve.mitre.org)
     Apache HTTP Server 2.4.65 and earlier with Server Side Includes
     (SSI) enabled and mod_cgid (but not mod_cgi) passes the
     shell-escaped query string to #exec cmd="..." directives.
     This issue affects Apache HTTP Server before 2.4.66.
  *) SECURITY: CVE-2025-55753: Apache HTTP Server: mod_md (ACME),
     unintended retry intervals (cve.mitre.org)
     An integer overflow in the case of failed ACME certificate
     renewal leads, after a number of failures (~30 days in default
     configurations), to the backoff timer becoming 0. Attempts to
     renew the certificate then are repeated without delays until it
     succeeds.
     This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.
  *) mod_http2: Fix handling of 304 responses from mod_cache.
  *) mod_http2/mod_proxy_http2: fix a bug in calculating the log2 value of
     integers, used in push diaries and proxy window size calculations.
  *) mod_md: update to version 2.6.5
     - New directive `MDInitialDelay`, controlling how longer to wait after
       a server restart before checking certificates for renewal.
       [Michael Kaufmann]
     - Hardening: when build with OpenSSL older than 1.0.2 or old libressl
       versions, the parsing of ASN.1 time strings did not do a length check.
     - Hardening: when reading back OCSP responses stored in the local JSON
       store, missing 'valid' key led to uninitialized values, resulting in
       wrong refresh behaviour.
  *) mod_md: update to version 2.6.6
     - Fix a small memory leak when using OpenSSL's BIGNUMs.
     - Fix reuse of curl easy handles by resetting them.
  *) mod_http2: update to version 2.0.35
     New directive `H2MaxStreamErrors` to control how much bad behaviour
     by clients is tolerated before the connection is closed.
  *) mod_proxy_http2: add support for ProxyErrorOverride directive.
  *) mpm_common: Add new ListenTCPDeferAccept directive that allows to specify
     the value set for the TCP_DEFER_ACCEPT socket option on listen sockets.
  *) mod_ssl: Add SSLVHostSNIPolicy directive to control the virtual
     host compatibility policy.
  *) mod_md: update to version 2.6.2
     - Fix error retry delay calculation to not already doubling the wait
       on the first error.
  *) mod_md: update to version 2.6.1
     - Increasing default `MDRetryDelay` to 30 seconds to generate less bursty
       traffic on errored renewals for the ACME CA. This leads to error retries
        of 30s, 1 minute, 2, 4, etc. up to daily attempts.
     - Checking that configuring `MDRetryDelay` will result in a positive
       duration. A delay of 0 is not accepted.
     - Fix a bug in checking Content-Type of responses from the ACME server.
     - Added ACME ARI support (rfc9773) to the module. Enabled by default. New
       directive "MDRenewViaARI on|off" for controlling this.
     - Removing tailscale support. It has not been working for a long time
       as the company decided to change their APIs. Away with the dead code,
       documentation and tests.
     - Fixed a compilation issue with pre-industrial versions of libcurl.
- httpd testsuite of svn revision 1929573

OBS-URL: https://build.opensuse.org/request/show/1321598
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=731
2025-12-08 20:36:56 +00:00
7f28caabda - Make /usr/sbin/httpd a dedicated script again, this fixes building modules
while still making Apache free of update-alternatives, relying entirely
  on sysconfig to dispatch the appropriate MPM.

OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=729
2025-11-04 20:43:03 +00:00
369b30c142 Accepting request 1314641 from home:dimstar:Factory
- Ensure the mpm subpackages sync their rebuild counter with the
  main package to have the installations work reliably.

Otherwise, things like
https://build.opensuse.org/package/show/openSUSE:Factory:zSystems/apache2
can happen; apache2 had more rebuilds than the MPMs and thus we can end up with
 unresolvable: nothing provides (apache2-prefork = 2.4.65-3.4 if apache2-prefork) needed by apache2

OBS-URL: https://build.opensuse.org/request/show/1314641
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=728
2025-11-04 18:42:23 +00:00
d069dfd19f - Re-introduce /usr/sbin/httpd
- Links to start_apache2, which now contains the logic to dispatch
  to the appropriate MPM respecting sysconfig's decision.

OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=726
2025-10-21 11:32:54 +00:00
2cd34b5fd0 Accepting request 1311136 from home:mschreiner:branches:Apache
- Migrate from update-alternatives (bsc#1245830).
- The APACHE_MPM environment variable now controls which MPM will be used.
  If an empty string is provided, the script-helpers file implements its own logic
  to pick an MPM from the currently installed ones.
  As at least one MPM is always required, this will work just fine.

OBS-URL: https://build.opensuse.org/request/show/1311136
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=725
2025-10-13 20:58:48 +00:00
6c4ed74764 Accepting request 1306753 from home:pgajdos:libxml2
- httpd testsuite of svn revision 1928711, fixes the failure
  caused by libxml2 version update to 2.14

OBS-URL: https://build.opensuse.org/request/show/1306753
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=723
2025-09-23 14:02:23 +00:00
fe73fa2fe5 Accepting request 1295320 from home:pgajdos
- version update to 2.4.65
  *) SECURITY: CVE-2025-54090: Apache HTTP Server: 'RewriteCond expr'
     always evaluates to true in 2.4.64 (cve.mitre.org)
     A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond
     expr ..." tests evaluating as "true".
     Users are recommended to upgrade to version 2.4.65, which fixes
     the issue.

OBS-URL: https://build.opensuse.org/request/show/1295320
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=721
2025-07-23 12:56:49 +00:00
4300bba466 Accepting request 1294247 from home:mschreiner:branches:Apache
* Refresh patches:
  - apache-test-application-xml-type.patch
  - apache-test-turn-off-variables-in-ssl-var-lookup.patch
  - apache2-HttpContentLengthHeadZero-HttpExpectStrict.patch
  - apache2-LimitRequestFieldSize-limits-headers.patch
* Update to 2.4.64.
* CVE-2025-53020: Apache HTTP Server: HTTP/2 DoS by Memory Increase
* CVE-2025-49812: Apache HTTP Server: mod_ssl TLS upgrade attack
* CVE-2025-49630: Apache HTTP Server: mod_proxy_http2 denial of service
* CVE-2025-23048: Apache HTTP Server: mod_ssl access control bypass with session resumption
* CVE-2024-47252: Apache HTTP Server: mod_ssl error log variable escaping
* CVE-2024-43394: Apache HTTP Server: SSRF on Windows due to UNC paths
* CVE-2024-43204: Apache HTTP Server: SSRF with mod_headers setting Content-Type header
* CVE-2024-42516: Apache HTTP Server: HTTP response splitting
* mod_proxy_ajp: Use iobuffersize set on worker level for the IO buffer
  size.
* mod_ssl: Drop $SSLKEYLOGFILE handling internally for OpenSSL 3.5
  builds which enable it in libssl natively.
* mod_asis: Fix the log level of the message AH01236.
* mod_session_dbd: ensure format used with SessionDBDCookieName and
  SessionDBDCookieName2 are correct.
* mod_headers: 'RequestHeader set|edit|edit_r Content-Type X' could
  inadvertently modify the Content-Type _response_ header. Applies to
  Content-Type only and likely to only affect static file responses.
* mod_ssl: Remove warning over potential uninitialised value
  for ssl protocol prior to protocol selection.
* mod_proxy: Reuse ProxyRemote connections when possible, like prior
  to 2.4.59.
* mod_systemd: Add systemd socket activation support.
* mod_systemd: Log the SELinux context at startup if available and

OBS-URL: https://build.opensuse.org/request/show/1294247
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=719
2025-07-18 03:49:15 +00:00
d2fe688ea4 Accepting request 1251624 from home:mschreiner:branches:Apache
- Update to 2.4.63:
  * mod_dav: Update redirect-carefully example BrowserMatch config
    to match more recent client versions.
  * mod_cache_socache: Fix possible crash on error path.
  * mod_ssl: Fail cleanly at startup if OpenSSL initialization fails.
  * mod_md: update to version 2.4.31
    - Improved error reporting when waiting for ACME server to verify
      domains or finalizing the order fails, e.g. times out.
    - Increasing the timeouts to wait for ACME server to verify domain
      names and issue the certificate from 30 seconds to 5 minutes.
    - Change a log level from error to debug when Stapling is enabled
      but a certificate carries no OCSP responder URL.
  * mod_proxy_balancer: Fix the handling of the stickysession
    configuration parameter by the balancer manager.
  * Add the ldap-search option to mod_authnz_ldap, allowing
    authorization to be based on arbitrary expressions that do not
    include the username.  Make sure that when ldap searches are too
    long, we explicitly log the error.
  * mod_proxy: Honor parameters of ProxyPassMatch workers with substitution
    in the host name or port.
  * mod_log_config: Fix merging for the "LogFormat" directive.
  * mod_lua: Make r.ap_auth_type writable.
  * mod_md: update to version 2.4.29
    - Fixed HTTP-01 challenges to not carry a final newline, as some
      ACME server fail to ignore it.
    - Fixed missing label+newline in server-status plain text output
      when MDStapling is enabled.
  * mod_ssl: Restore support for loading PKCS#11 keys via ENGINE
    without "SSLCryptoDevice" configured.
  * mod_authnz_ldap: Fix possible memory corruption if the

OBS-URL: https://build.opensuse.org/request/show/1251624
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=717
2025-03-10 05:09:18 +00:00
6010246e4c Accepting request 1180997 from home:crameleon:branches:Apache
- Require main apache2 package in MPM packages (boo#1226379)

OBS-URL: https://build.opensuse.org/request/show/1180997
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=715
2025-03-07 15:18:26 +00:00
6e2193fc73 Accepting request 1237660 from home:dimstar:Factory
- Fix builds of test package with RPM 4.20:
  + noarch packages cannot rely on libdir, which is an
    arch-dependent variable. Rely on apxs -q libdir to extract the
    correct information instead.

OBS-URL: https://build.opensuse.org/request/show/1237660
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=713
2025-01-14 10:27:27 +00:00
0bdd99d90d Accepting request 1221590 from home:mschreiner:branches:Apache
- Update httpd-framework to svn1921782.
- Fixes Apache's impact on bsc#1218342.

OBS-URL: https://build.opensuse.org/request/show/1221590
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=711
2024-11-05 18:24:44 +00:00
2062e48982 Accepting request 1221258 from home:jengelh:branches:Apache
- Explicitly mark start_apache2 as bash-dependent.

If you have dash-sh installed, apache2 completely fails to start:

Nov 04 21:52:14 f3 start_apache2[55066]: /usr/sbin/start_apache2: 158: Syntax error: "(" unexpected

OBS-URL: https://build.opensuse.org/request/show/1221258
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=710
2024-11-05 18:14:23 +00:00
30a638bdc2 Accepting request 1204794 from home:kukuk:cleanup
- Add /srv/www directories to filelist [bsc#1231027] 
  (apache2 will not start since default config uses this directory)

OBS-URL: https://build.opensuse.org/request/show/1204794
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=708
2024-10-02 19:42:36 +00:00
129fff1b8c Accepting request 1191452 from home:adkorte:branches:Apache
- Update to 2.4.62
  *) SECURITY: CVE-2024-40898: Apache HTTP Server: SSRF with
     mod_rewrite in server/vhost context on Windows (cve.mitre.org)
     [boo#1228098]
     SSRF in Apache HTTP Server on Windows with mod_rewrite in
     server/vhost context, allows to potentially leak NTML hashes to
     a malicious server via SSRF and malicious requests.
     Users are recommended to upgrade to version 2.4.62 which fixes
     this issue.
     Credits: Smi1e (DBAPPSecurity Ltd.)
  *) SECURITY: CVE-2024-40725: Apache HTTP Server: source code
     disclosure with handlers configured via AddType (cve.mitre.org)
     [boo#1228097]
     A partial fix for  CVE-2024-39884 in the core of Apache HTTP
     Server 2.4.61 ignores some use of the legacy content-type based
     configuration of handlers. "AddType" and similar configuration,
     under some circumstances where files are requested indirectly,
     result in source code disclosure of local content. For example,
     PHP scripts may be served instead of interpreted.
     Users are recommended to upgrade to version 2.4.62, which fixes
     this issue.
  *) mod_proxy: Fix canonicalisation and FCGI env (PATH_INFO, SCRIPT_NAME) for
     "balancer:" URLs set via SetHandler, also allowing for "unix:" sockets
     with BalancerMember(s).  PR 69168.  [Yann Ylavic]
  *) mod_proxy: Avoid AH01059 parsing error for SetHandler "unix:" URLs.
     PR 69160 [Yann Ylavic]
  *) mod_ssl: Fix crashes in PKCS#11 ENGINE support with OpenSSL 3.2.
     [Joe Orton]
  *) mod_ssl: Add support for loading certs/keys from pkcs11: URIs
     via OpenSSL 3.x providers.  [Ingo Franzki <ifranzki linux.ibm.com>]
  *) mod_ssl: Restore SSL dumping on trace7 loglevel with OpenSSL >= 3.0.
     [Ruediger Pluem, Yann Ylavic]
  *) mpm_worker: Fix possible warning (AH00045) about children processes not
     terminating timely.  [Yann Ylavic]

OBS-URL: https://build.opensuse.org/request/show/1191452
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=706
2024-08-07 12:48:58 +00:00
39f20e4cff Accepting request 1185778 from home:adkorte:branches:Apache
- Update to 2.4.61
  *) SECURITY: CVE-2024-39884: Apache HTTP Server: source code
     disclosure with handlers configured via AddType (cve.mitre.org)
     [boo#1227353]
     A regression in the core of Apache HTTP Server 2.4.60 ignores
     some use of the legacy content-type based configuration of
     handlers.   "AddType" and similar configuration, under some
     circumstances where files are requested indirectly, result in
     source code disclosure of local content. For example, PHP
     scripts may be served instead of interpreted.
     Users are recommended to upgrade to version 2.4.61, which fixes
     this issue.
- Update to 2.4.60
  *) SECURITY: CVE-2024-39573: Apache HTTP Server: mod_rewrite proxy
     handler substitution (cve.mitre.org) [boo#1227271]
     Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and
     earlier allows an attacker to cause unsafe RewriteRules to
     unexpectedly setup URL's to be handled by mod_proxy.
     Credits: Orange Tsai (@orange_8361) from DEVCORE
  *) SECURITY: CVE-2024-38477: Apache HTTP Server: Crash resulting in
     Denial of Service in mod_proxy via a malicious request
     (cve.mitre.org) [boo#1227270]
     null pointer dereference in mod_proxy in Apache HTTP Server
     2.4.59 and earlier allows an attacker to crash the server via a
     malicious request.
     Credits: Orange Tsai (@orange_8361) from DEVCORE
  *) SECURITY: CVE-2024-38476: Apache HTTP Server may use
     exploitable/malicious backend application output to run local
     handlers via internal redirect (cve.mitre.org) [boo#1227269]
     Vulnerability in core of Apache HTTP Server 2.4.59 and earlier
     are vulnerably to information disclosure, SSRF or local script
     execution via backend applications whose response headers are
     malicious or exploitable.
     Note: Some legacy uses of the 'AddType' directive to connect a
     request to a handler must be ported to 'AddHandler' after this fix.
     Credits: Orange Tsai (@orange_8361) from DEVCORE
  *) SECURITY: CVE-2024-38475: Apache HTTP Server weakness in
     mod_rewrite when first segment of substitution matches
     filesystem path. (cve.mitre.org) [boo#1227268]
     Improper escaping of output in mod_rewrite in Apache HTTP Server
     2.4.59 and earlier allows an attacker to map URLs to filesystem
     locations that are permitted to be served by the server but are
     not intentionally/directly reachable by any URL, resulting in
     code execution or source code disclosure.
     Substitutions in server context that use a backreferences or
     variables as the first segment of the substitution are affected.
     Some unsafe RewiteRules will be broken by this change and the
     rewrite flag "UnsafePrefixStat" can be used to opt back in once
     ensuring the substitution is appropriately constrained.
     Credits: Orange Tsai (@orange_8361) from DEVCORE
  *) SECURITY: CVE-2024-38474: Apache HTTP Server weakness with
     encoded question marks in backreferences (cve.mitre.org)
     [boo#1227278]
     Substitution encoding issue in mod_rewrite in Apache HTTP Server
     2.4.59 and earlier allows attacker to execute scripts in
     directories permitted by the configuration but not directly
     reachable by any URL or source disclosure of scripts meant to
     only to be executed as CGI.
     Note: Some RewriteRules that capture and substitute unsafely will now
     fail unless rewrite flag "UnsafeAllow3F" is specified.
     Credits: Orange Tsai (@orange_8361) from DEVCORE
  *) SECURITY: CVE-2024-38473: Apache HTTP Server proxy encoding
     problem (cve.mitre.org) [boo#1227276]
     Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and
     earlier allows request URLs with incorrect encoding to be sent
     to backend services, potentially bypassing authentication via
     crafted requests.
     Credits: Orange Tsai (@orange_8361) from DEVCORE
  *) SECURITY: CVE-2024-38472: Apache HTTP Server on WIndows UNC SSRF
     (cve.mitre.org) [boo#1227267]
     SSRF in Apache HTTP Server on Windows allows to potentially leak
     NTML hashes to a malicious server via SSRF and malicious
     requests or content
     Note: Existing configurations that access UNC paths
     will have to configure new directive "UNCList" to allow access
     during request processing.
     Credits: Orange Tsai (@orange_8361) from DEVCORE
  *) SECURITY: CVE-2024-36387: Apache HTTP Server: DoS by Null
     pointer in websocket over HTTP/2 (cve.mitre.org) [boo#1227272]
     Serving WebSocket protocol upgrades over a HTTP/2 connection
     could result in a Null Pointer dereference, leading to a crash
     of the server process, degrading performance.
     Credits: Marc Stern (<marc.stern AT approach-cyber.com>)

OBS-URL: https://build.opensuse.org/request/show/1185778
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=704
2024-07-08 10:21:09 +00:00
d9afb9cfb7 Accepting request 1180827 from home:pgajdos
- added patches [bsc#1226217]
  c2fffd29b0
  + apache2-issue-444.patch

OBS-URL: https://build.opensuse.org/request/show/1180827
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=702
2024-06-19 11:52:27 +00:00
ef55205e3e Accepting request 1165100 from home:adkorte:branches:Apache
- Update to 2.4.59:
  *) mod_deflate: Fixes and better logging for handling various
     error and edge cases. [Eric Covener, Yann Ylavic, Joe Orton,
     Eric Norris <enorris etsy.com>]
  *) Add CGIScriptTimeout to mod_cgi. [Eric Covener]
  *) mod_xml2enc: Tolerate libxml2 2.12.0 and later.  PR 68610
     [ttachi <tachihara AT hotmail.com>]
  *) mod_slotmem_shm: Use ap_os_is_path_absolute() to make it portable.
     [Jean-Frederic Clere]
  *) mod_ssl: Use OpenSSL-standard functions to assemble CA
     name lists for SSLCACertificatePath/SSLCADNRequestPath.
     Names will now be consistently sorted. PR 61574.
     [Joe Orton]
  *) mod_xml2enc: Update check to accept any text/ media type
     or any XML media type per RFC 7303, avoiding
     corruption of Microsoft OOXML formats.  PR 64339.
     [Joseph Heenan <joseph.heenan fintechlabs.io>, Joe Orton]
  *) mod_http2: v2.0.26 with the following fixes:
     - Fixed `Date` header on requests upgraded from HTTP/1.1 (h2c). Fixes
       <https://github.com/icing/mod_h2/issues/272>.
     - Fixed small memory leak in h2 header bucket free. Thanks to
       Michael Kaufmann for finding this and providing the fix.
  *) htcacheclean: In -a/-A mode, list all files per subdirectory
     rather than only one. PR 65091.
     [Artem Egorenkov <aegorenkov.91 gmail.com>]
  *) mod_ssl: SSLProxyMachineCertificateFile/Path may reference files
     which include CA certificates; those CA certs are treated as if
     configured with SSLProxyMachineCertificateChainFile.  [Joe Orton]
  *) htpasswd, htdbm, dbmmanage: Update help&docs to refer to
     "hashing", rather than "encrypting" passwords.
     [Michele Preziuso <mpreziuso kaosdynamics.com>]
  *) mod_ssl: Fix build with LibreSSL 2.0.7+. PR 64047.
     [Giovanni Bechis, Yann Ylavic]
  *) htpasswd: Add support for passwords using SHA-2.  [Joe Orton,
     Yann Ylavic]
  *) core: Allow mod_env to override system environment vars. [Joe Orton]
  *) Allow mod_dav_fs to tolerate race conditions between PROPFIND and an
     operation which removes a directory/file between apr_dir_read() and
     apr_stat(). Current behaviour is to abort the connection which seems
     inferior to tolerating (and logging) the error. [Joe Orton]
  *) mod_ldap: HTML-escape data in the ldap-status handler.
     [Eric Covener, Chamal De Silva]
  *) mod_ssl: Disable the OpenSSL ENGINE API when OPENSSL_NO_ENGINE is set.
     Allow for "SSLCryptoDevice builtin" if the ENGINE API is not available,
     notably with OpenSSL >= 3.  PR 68080.  [Yann Ylavic, Joe Orton]
  *) mod_ssl: Improve compatibility with OpenSSL 3, fix build warnings about
     deprecated ENGINE_ API, honor OPENSSL_API_COMPAT setting while defaulting
     to compatibitily with version 1.1.1 (including ENGINEs / SSLCryptoDevice).
     [Yann Ylavic]
  *) mod_ssl: release memory to the OS when needed. [Giovanni Bechis]
  *) mod_proxy: Ignore (and warn about) enablereuse=on for ProxyPassMatch when
     some dollar substitution (backreference) happens in the hostname or port
     part of the URL.  [Yann Ylavic]
  *) mod_proxy: Allow to set a TTL for how long DNS resolutions to backend
     systems are cached. [Yann Ylavic]
  *) mod_proxy: Add optional third argument for ProxyRemote, which
     configures Basic authentication credentials to pass to the remote
     proxy.  PR 37355.  [Joe Orton]

OBS-URL: https://build.opensuse.org/request/show/1165100
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=700
2024-04-11 19:35:33 +00:00
73ea51886f Accepting request 1147806 from home:dimstar:rpm4.20:a
Prepare for RPM 4.20

OBS-URL: https://build.opensuse.org/request/show/1147806
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=698
2024-02-27 07:42:18 +00:00
e45d401fd5 Accepting request 1142224 from home:dirkmueller:Factory
- use grep -E for egrep

      characters on redirections without the "NE" flag.
  * CVE-2023-27522 [bsc#1209049]: mod_proxy_uwsgi HTTP response splitting
  * CVE-2023-25690 [bsc#1209047]: HTTP request splitting with mod_rewrite and mod_proxy
- Update to 2.4.56:
- Remove references to README.QUICKSTART and point them to
  to vendor specific directory /usr/etc/logrotate.d.
- Align some defaults in apache2-server-tuning.conf to upstream
  defaults:
  - httpd-2.4.x-fate317766-config-control-two-protocol-options.diff
  to honour net.core.somaxconn sysctl as the mandatory limit.
  the old value of 511 was never used as until v5.4-rc6 it was
  clamped to 128, in current kernels the default limit is 4096.
    and we should just set the value for the environment variable
    this type of map is present in the configuration.  PR62311.
    missed to signal it the normal way (eos buckets). Addresses github issues
    and https://github.com/icing/mod_h2/issues/170. [Stefan Eissing]
* %check: do not load all modules, just use default loadmodule.conf; some
- Add which and w3m as dependencies. poo#28406
- Replace references to /var/adm/fillup-templates with new
  * consider also case when hostname does return empty string or
- make the package runable on non systemd systems
- drop upstreamed patch:
- updated to 2.4.26: This release of Apache is a security, feature,
- update to 2.4.25: fixed several security issues (CVE-2016-8740,
  fixes and improvements of mod_http2 and other modules; see CHANGES
- verify tarball: added httpd*.bz2.asc, apache2.keyring and remove
- readd the support of multiple entries in APACHE_ACCESS_LOG
   * HttpExpectStrict - allow admin to control whether we must

OBS-URL: https://build.opensuse.org/request/show/1142224
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=696
2024-01-30 11:32:13 +00:00
975c19666b Accepting request 1118994 from home:david.anes:branches:Apache
- Update to 2.4.58:
  *) SECURITY: CVE-2023-45802: Apache HTTP Server: HTTP/2 stream
     memory not reclaimed right away on RST (cve.mitre.org)
     When a HTTP/2 stream was reset (RST frame) by a client, there
     was a time window were the request's memory resources were not
     reclaimed immediately. Instead, de-allocation was deferred to
     connection close. A client could send new requests and resets,
     keeping the connection busy and open and causing the memory
     footprint to keep on growing. On connection close, all resources
     were reclaimed, but the process might run out of memory before
     that.
     This was found by the reporter during testing of CVE-2023-44487
     (HTTP/2 Rapid Reset Exploit) with their own test client. During
     "normal" HTTP/2 use, the probability to hit this bug is very
     low. The kept memory would not become noticeable before the
     connection closes or times out.
     Users are recommended to upgrade to version 2.4.58, which fixes
     the issue.
     Credits: Will Dormann of Vul Labs
  *) SECURITY: CVE-2023-43622: Apache HTTP Server: DoS in HTTP/2 with
     initial windows size 0 (cve.mitre.org)
     An attacker, opening a HTTP/2 connection with an initial window
     size of 0, was able to block handling of that connection
     indefinitely in Apache HTTP Server. This could be used to
     exhaust worker resources in the server, similar to the well
     known "slow loris" attack pattern.
     This has been fixed in version 2.4.58, so that such connection
     are terminated properly after the configured connection timeout.
     This issue affects Apache HTTP Server: from 2.4.55 through
     2.4.57.

OBS-URL: https://build.opensuse.org/request/show/1118994
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=694
2023-10-19 14:44:15 +00:00
d5678a9092 Accepting request 1102468 from home:dstoecker
- Enable building of mod_md

OBS-URL: https://build.opensuse.org/request/show/1102468
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=692
2023-08-16 13:09:50 +00:00
a69275ec6d Accepting request 1077884 from home:adkorte:branches:Apache
OBS-URL: https://build.opensuse.org/request/show/1077884
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=690
2023-04-11 13:32:57 +00:00
0016f66e00 Accepting request 1070261 from home:david.anes:branches:Apache
- This update fixes the following security issues:
  * CVE-2023-27522 [bsc#1209049]: mod_proxy_uwsgi HTTP response splitting 
  * CVE-2023-25690 [bsc#1209047]: HTTP request splitting with mod_rewrite and mod_proxy  
- Update to 2.4.56: 
    *) rotatelogs: Add -T flag to allow subsequent rotated logfiles to be
      truncated without the initial logfile being truncated.  [Eric Covener]
    *) mod_ldap: LDAPConnectionPoolTTL should accept negative values in order to
      allow connections of any age to be reused. Up to now, a negative value
      was handled as an error when parsing the configuration file.  PR 66421.
      [nailyk <bzapache nailyk.fr>, Christophe Jaillet]
    *) mod_proxy_ajp: Report an error if the AJP backend sends an invalid number
      of headers. [Ruediger Pluem]
    *) mod_md:
      - Enabling ED25519 support and certificate transparency information when
        building with libressl v3.5.0 and newer. Thanks to Giovanni Bechis.
      - MDChallengeDns01 can now be configured for individual domains.
        Thanks to Jérôme Billiras (@bilhackmac) for the initial PR.
      - Fixed a bug found by Jérôme Billiras (@bilhackmac) that caused the challenge
        teardown not being invoked as it should.
      [Stefan Eissing]
    *) mod_http2: client resets of HTTP/2 streams led to unwanted 500 errors
      reported in access logs and error documents. The processing of the
      reset was correct, only unneccesary reporting was caused.
      [Stefan Eissing]
    *) mod_proxy_uwsgi: Stricter backend HTTP response parsing/validation.
      [Yann Ylavic]

  * CVE-2022-37436 [bsc#1207251], mod_proxy backend HTTP response splitting
  * CVE-2022-36760 [bsc#1207250], mod_proxy_ajp Possible request smuggling
  * CVE-2006-20001 [bsc#1207247], mod_dav out of bounds read, or write of zero byte

OBS-URL: https://build.opensuse.org/request/show/1070261
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=688
2023-03-08 20:52:02 +00:00
b3efde70d7 Accepting request 1060991 from home:david.anes:branches:Apache
- This update fixes the following security issues:

OBS-URL: https://build.opensuse.org/request/show/1060991
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=686
2023-01-25 16:45:25 +00:00
093f7348a7 Accepting request 1060983 from home:david.anes:branches:Apache
- This update fixes te following security issues.
  * fix CVE-2022-37436 [bsc#1207251], mod_proxy backend HTTP response splitting
  * fix CVE-2022-36760 [bsc#1207250], mod_proxy_ajp Possible request smuggling
  * fix CVE-2006-20001 [bsc#1207247], mod_dav out of bounds read, or write of zero byte

OBS-URL: https://build.opensuse.org/request/show/1060983
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=685
2023-01-25 16:37:03 +00:00
4c2a2dab1e Accepting request 1059452 from home:david.anes:branches:Apache
- Update to 2.4.55:
    *) SECURITY: CVE-2022-37436: Apache HTTP Server: mod_proxy prior to
      2.4.55 allows a backend to trigger HTTP response splitting
      (cve.mitre.org)
      Prior to Apache HTTP Server 2.4.55, a malicious backend can
      cause the response headers to be truncated early, resulting in
      some headers being incorporated into the response body. If the
      later headers have any security purpose, they will not be
      interpreted by the client.
      Credits: Dimas Fariski Setyawan Putra (@nyxsorcerer)
    *) SECURITY: CVE-2022-36760: Apache HTTP Server: mod_proxy_ajp
      Possible request smuggling (cve.mitre.org)
      Inconsistent Interpretation of HTTP Requests ('HTTP Request
      Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server
      allows an attacker to smuggle requests to the AJP server it
      forwards requests to.  This issue affects Apache HTTP Server
      Apache HTTP Server 2.4 version 2.4.54 and prior versions.
      Credits: ZeddYu_Lu from Qi'anxin Research Institute of Legendsec
      at Qi'anxin Group
    *) SECURITY: CVE-2006-20001: mod_dav out of  bounds read, or write
      of zero byte (cve.mitre.org)
      A carefully crafted If: request header can cause a memory read,
      or write of a single zero byte, in a pool (heap) memory location
      beyond the header value sent. This could cause the process to
      crash.
      This issue affects Apache HTTP Server 2.4.54 and earlier.
    *) mod_dav: Open the lock database read-only when possible.
      PR 36636 [Wilson Felipe <wfelipe gmail.com>, manu]
    *) mod_proxy_http2: apply the standard httpd content type handling
      to responses from the backend, as other proxy modules do. Fixes PR 66391.

OBS-URL: https://build.opensuse.org/request/show/1059452
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=682
2023-01-19 09:33:48 +00:00
466a98bde2 Accepting request 1043175 from home:dirkmueller:Factory
- switch to pkgconfig(zlib) so that alternative providers can be
  used

OBS-URL: https://build.opensuse.org/request/show/1043175
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=680
2022-12-16 07:31:14 +00:00
88234fc75a Accepting request 1005549 from home:coolo:branches:openSUSE:Factory
- The 2.4.54 release brought support for PCRE2, but for that we also
  need to change buildrequires to pcre2-devel

OBS-URL: https://build.opensuse.org/request/show/1005549
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=678
2022-09-23 06:20:26 +00:00
f94d055b0f Accepting request 1004993 from home:david.anes:branches:Apache
- Remove references to README.QUICKSTART and point them to 
  https://en.opensuse.org/SDB:Apache_installation (bsc#1203573)

OBS-URL: https://build.opensuse.org/request/show/1004993
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=676
2022-09-20 15:10:26 +00:00
10e46ecad2 Accepting request 1000574 from home:schubi2
- Migration to /usr/etc: Saving user changed configuration files
  in /etc and restoring them while an RPM update.

OBS-URL: https://build.opensuse.org/request/show/1000574
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=674
2022-09-12 14:19:14 +00:00
3e48c45a6c Accepting request 985724 from home:schubi2
- Moved logrotate files from user specific directory /etc/logrotate.d
  to vendor specific directory /usr/etc/logrotate.d.

OBS-URL: https://build.opensuse.org/request/show/985724
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=672
2022-06-29 09:30:56 +00:00
86fecf925b Accepting request 981544 from home:david.anes:branches:Apache
Merge sroeder (details about CVEs) and pgajdos requests.

- update httpd-framework to svn revision 1898917

- version update to 2.4.54
  Changes with Apache 2.4.54
    *) SECURITY: CVE-2022-31813: mod_proxy X-Forwarded-For dropped by
       hop-by-hop mechanism (cve.mitre.org)
       Apache HTTP Server 2.4.53 and earlier may not send the
       X-Forwarded-* headers to the origin server based on client side
       Connection header hop-by-hop mechanism.
       This may be used to bypass IP based authentication on the origin
       server/application.
       Credits: The Apache HTTP Server project would like to thank
       Gaetan Ferry (Synacktiv) for reporting this issue
    *) SECURITY: CVE-2022-30556: Information Disclosure in mod_lua with
       websockets (cve.mitre.org)
       Apache HTTP Server 2.4.53 and earlier may return lengths to
       applications calling r:wsread() that point past the end of the
       storage allocated for the buffer.
       Credits: The Apache HTTP Server project would like to thank
       Ronald Crane (Zippenhop LLC) for reporting this issue
    *) SECURITY: CVE-2022-30522: mod_sed denial of service
       (cve.mitre.org)
       If Apache HTTP Server 2.4.53 is configured to do transformations
       with mod_sed in contexts where the input to mod_sed may be very
       large, mod_sed may make excessively large memory allocations and
       trigger an abort.
       Credits: This issue was found by Brian Moussalli from the JFrog
       Security Research team
    *) SECURITY: CVE-2022-29404: Denial of service in mod_lua
       r:parsebody (cve.mitre.org)

OBS-URL: https://build.opensuse.org/request/show/981544
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=670
2022-06-09 16:03:37 +00:00
3f2f15a5e3 Accepting request 961683 from home:pgajdos
- httpd-framework updated to svn1898917
- deleted patches
  - apache-test-DirectorySlash-NotFound-logic.patch (upstreamed)
  - apache2-perl-io-socket.patch (upstreamed)

OBS-URL: https://build.opensuse.org/request/show/961683
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=668
2022-03-14 19:29:42 +00:00
22a9ecc83b Accepting request 961671 from home:pgajdos
- version update to 2.4.53
  *) SECURITY: CVE-2022-23943: mod_sed: Read/write beyond bounds
     (cve.mitre.org)
     Out-of-bounds Write vulnerability in mod_sed of Apache HTTP
     Server allows an attacker to overwrite heap memory with possibly
     attacker provided data.
     This issue affects Apache HTTP Server 2.4 version 2.4.52 and
     prior versions.
     Credits: Ronald Crane (Zippenhop LLC)
  *) SECURITY: CVE-2022-22721: core: Possible buffer overflow with
     very large or unlimited LimitXMLRequestBody (cve.mitre.org)
     If LimitXMLRequestBody is set to allow request bodies larger
     than 350MB (defaults to 1M) on 32 bit systems an integer
     overflow happens which later causes out of bounds writes.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Anonymous working with Trend Micro Zero Day Initiative
  *) SECURITY: CVE-2022-22720: HTTP request smuggling vulnerability
     in Apache HTTP Server 2.4.52 and earlier (cve.mitre.org)
     Apache HTTP Server 2.4.52 and earlier fails to close inbound
     connection when errors are encountered discarding the request
     body, exposing the server to HTTP Request Smuggling
     Credits: James Kettle <james.kettle portswigger.net>
  *) SECURITY: CVE-2022-22719: mod_lua Use of uninitialized value of
     in r:parsebody (cve.mitre.org)
     A carefully crafted request body can cause a read to a random
     memory area which could cause the process to crash.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Chamal De Silva
  *) core: Make sure and check that LimitXMLRequestBody fits in system memory.
     [Ruediger Pluem, Yann Ylavic]

OBS-URL: https://build.opensuse.org/request/show/961671
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=667
2022-03-14 12:02:14 +00:00
67c092fa61 Accepting request 949462 from home:pgajdos
- ssl-global.conf: set SSLCipherSuite to PROFILE=SYSTEM instead of
  DEFAULT_SUSE [jsc#SLE-22561]
- set also SSLProxyCipherSuite to PROFILE=SYSTEM
- modified sources
  % apache2-ssl-global.conf

OBS-URL: https://build.opensuse.org/request/show/949462
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=666
2022-01-31 10:50:24 +00:00
b88f04dfaf Accepting request 945607 from home:david.anes:branches:Apache
Fix bsc#1194062 by using default upstream values for ServerLimit and MaxConnectionsPerChild

OBS-URL: https://build.opensuse.org/request/show/945607
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=665
2022-01-13 14:19:25 +00:00
0db4e8212b Accepting request 945375 from home:olh:branches:Apache
- remove instance units from post scripts, they can not be reloaded

OBS-URL: https://build.opensuse.org/request/show/945375
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=664
2022-01-11 07:57:05 +00:00
1656a40c93 Accepting request 945399 from home:dimstar:Factory
- Add apache2-perl-io-socket.patch: t/ssl/ocsp.t: Handle new error
  message raised by IO-Socket-SSL 2.073.

Fixes build with Perl-IO-socket-SSL 2.073, as currently staged in :E

OBS-URL: https://build.opensuse.org/request/show/945399
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=663
2022-01-11 06:03:57 +00:00
0214d9c415 Accepting request 941816 from home:AndreasStieger:branches:Apache
changlog update for 2.4.52:
CVE-2021-44224 boo#1193943
CVE-2021-44790 boo#1193942

OBS-URL: https://build.opensuse.org/request/show/941816
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=662
2021-12-21 10:28:15 +00:00
837b99c604 Accepting request 941644 from home:david.anes:branches:Apache
Update to 2.4.52

OBS-URL: https://build.opensuse.org/request/show/941644
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=660
2021-12-20 11:46:23 +00:00
40522c2c9a - httpd-framework updated to svn1894461
- added patches
  fix reverted logic, DirectorySlash NotFound is available in trunk only
  + apache-test-DirectorySlash-NotFound-logic.patch
- do not consider php tests, they do not run anyway

OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=659
2021-11-24 11:09:35 +00:00
d37e99d2a8 Accepting request 931327 from home:adkorte:branches:Apache
- add section for the 'event' MPM to apache2-server-tuning.conf

OBS-URL: https://build.opensuse.org/request/show/931327
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=658
2021-11-15 08:27:53 +00:00
6b42c59258 Accepting request 924064 from home:stroeder:network
- version update to 2.4.51
  *) SECURITY: CVE-2021-42013: Path Traversal and Remote Code
     Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete
     fix of CVE-2021-41773) (cve.mitre.org)
  *) core: Add ap_unescape_url_ex() for better decoding control, and deprecate
     unused AP_NORMALIZE_DROP_PARAMETERS flag.

OBS-URL: https://build.opensuse.org/request/show/924064
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=657
2021-10-08 06:03:36 +00:00
a75e9522eb Accepting request 923076 from home:stroeder:network
version update to 2.4.50

OBS-URL: https://build.opensuse.org/request/show/923076
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=656
2021-10-05 08:25:59 +00:00
f409625e9f - version update to 2.4.49
*) core/mod_proxy/mod_ssl:
     Adding `outgoing` flag to conn_rec, indicating a connection is
     initiated by the server to somewhere, in contrast to incoming
     connections from clients.
     Adding 'ap_ssl_bind_outgoing()` function that marks a connection
     as outgoing and is used by mod_proxy instead of the previous
     optional function `ssl_engine_set`. This enables other SSL
     module to secure proxy connections.
     The optional functions `ssl_engine_set`, `ssl_engine_disable` and
     `ssl_proxy_enable` are now provided by the core to have backward
     compatibility with non-httpd modules that might use them. mod_ssl
     itself no longer registers these functions, but keeps them in its
     header for backward compatibility.
     The core provided optional function wrap any registered function
     like it was done for `ssl_is_ssl`.
     [Stefan Eissing]
  *) mod_ssl: Support logging private key material for use with
     wireshark via log file given by SSLKEYLOGFILE environment
     variable.  Requires OpenSSL 1.1.1.  PR 63391.  [Joe Orton]
  *) mod_proxy: Do not canonicalize the proxied URL when both "nocanon" and
     "ProxyPassInterpolateEnv On" are configured.  PR 65549.
     [Joel Self <joelself gmail.com>]
  *) mpm_event: Fix children processes possibly not stopped on graceful
     restart.  PR 63169.  [Joel Self <joelself gmail.com>]
  *) mod_proxy: Fix a potential infinite loop when tunneling Upgrade(d)
     protocols from mod_proxy_http, and a timeout triggering falsely when
     using mod_proxy_wstunnel, mod_proxy_connect or mod_proxy_http with
     upgrade= setting.  PRs 65521 and 65519.  [Yann Ylavic]
  *) mod_unique_id: Reduce the time window where duplicates may be generated

OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=655
2021-09-17 08:39:47 +00:00
79985d0758 - introduce APACHE_TACEENABLE sysconfig variable, which translates
to /etc/apache2/sysconfig.d/global.conf:TraceEnable on/off
- modified sources
  % apache2-global.conf
  % apache2-start_apache2
  % sysconfig.apache2

OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=654
2021-08-02 17:34:05 +00:00
66cfb6bbb8 - version update to 2.4.48
Changes with Apache 2.4.48
  *) mod_proxy_wstunnel: Add ProxyWebsocketFallbackToProxyHttp to opt-out the
     fallback to mod_proxy_http for WebSocket upgrade and tunneling.
     [Yann Ylavic]
  *) mod_proxy: Fix flushing of THRESHOLD_MIN_WRITE data while tunneling.
     BZ 65294.  [Yann Ylavic]
  *) core: Fix a regression that stripped the ETag header from 304 responses.
     PR 61820 [Ruediger Pluem, Roy T. Fielding]
  *) core: Adding SSL related inquiry functions to the server API.
     These function are always available, even when no module providing
     SSL is loaded. They provide their own "shadowing" implementation for
     the optional functions of similar name that mod_ssl and impersonators
     of mod_ssl provide.
     This enables loading of several SSL providing modules when all but
     one of them registers itself into the new hooks. Two old-style SSL
     modules will not work, as they replace the others optional functions
     with their own.
     Modules using the old-style optional functions will continue to work
     as core supplies its own versions of those.
     The following has been added so far:
     - ap_ssl_conn_is_ssl() to query if a connection is using SSL.
     - ap_ssl_var_lookup() to query SSL related variables for a
       server/connection/request.
     - Hooks for 'ssl_conn_is_ssl' and 'ssl_var_lookup' where modules
       providing SSL can install their own value supplying functions.
     - ap_ssl_add_cert_files() to enable other modules like mod_md to provide
       certificate and keys for an SSL module like mod_ssl.
     - ap_ssl_add_fallback_cert_files() to enable other modules like mod_md to

OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=651
2021-06-02 07:37:52 +00:00
b3b2ec46cd Accepting request 867271 from home:gmbr3:Lua
- Add lua54.patch to fix building with lua54

OBS-URL: https://build.opensuse.org/request/show/867271
OBS-URL: https://build.opensuse.org/package/show/Apache/apache2?expand=0&rev=649
2021-01-28 09:54:32 +00:00