2bde2c8dc7Accepting request 1237712 from Apache
factory
Ana Guerrero
2025-01-15 16:42:06 +0000
7e57f4d1e3- Fix builds of test package with RPM 4.20: + noarch packages cannot rely on libdir, which is an arch-dependent variable. Rely on apxs -q libdir to extract the correct information instead.
devel
Petr Gajdos2025-01-14 10:27:27 +0000
ff8f362dacAccepting request 1221591 from Apache
Ana Guerrero
2024-11-06 15:49:13 +0000
e7ac9d37d9- Update httpd-framework to svn1921782. - Fixes Apache's impact on bsc#1218342.
Martin Schreiner
2024-11-05 18:24:44 +0000
62e3b1fe7e- Explicitly mark start_apache2 as bash-dependent.
Martin Schreiner
2024-11-05 18:14:23 +0000
9695f91e0bAccepting request 1205314 from Apache
Ana Guerrero
2024-10-03 15:59:19 +0000
3684930e1f- Add /srv/www directories to filelist [bsc#1231027] (apache2 will not start since default config uses this directory)
Martin Schreiner
2024-10-02 19:42:36 +0000
56b3280607Accepting request 1192286 from Apache
Dominique Leuenberger
2024-08-08 08:57:11 +0000
9ac936a203- Update to 2.4.62 *) SECURITY: CVE-2024-40898: Apache HTTP Server: SSRF with mod_rewrite in server/vhost context on Windows (cve.mitre.org) [boo#1228098] SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. Credits: Smi1e (DBAPPSecurity Ltd.) *) SECURITY: CVE-2024-40725: Apache HTTP Server: source code disclosure with handlers configured via AddType (cve.mitre.org) [boo#1228097] A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.62, which fixes this issue. *) mod_proxy: Fix canonicalisation and FCGI env (PATH_INFO, SCRIPT_NAME) for "balancer:" URLs set via SetHandler, also allowing for "unix:" sockets with BalancerMember(s). PR 69168. [Yann Ylavic] *) mod_proxy: Avoid AH01059 parsing error for SetHandler "unix:" URLs. PR 69160 [Yann Ylavic] *) mod_ssl: Fix crashes in PKCS#11 ENGINE support with OpenSSL 3.2. [Joe Orton] *) mod_ssl: Add support for loading certs/keys from pkcs11: URIs via OpenSSL 3.x providers. [Ingo Franzki <ifranzki linux.ibm.com>] *) mod_ssl: Restore SSL dumping on trace7 loglevel with OpenSSL >= 3.0. [Ruediger Pluem, Yann Ylavic] *) mpm_worker: Fix possible warning (AH00045) about children processes not terminating timely. [Yann Ylavic]
David Anes
2024-08-07 12:48:58 +0000
222bf624beAccepting request 1186139 from Apache
Ana Guerrero
2024-07-09 18:03:17 +0000
7a70b52ac1Accepting request 1185778 from home:adkorte:branches:Apache
David Anes
2024-07-08 10:21:09 +0000
5f6583c75bAccepting request 1181737 from Apache
Ana Guerrero
2024-06-20 14:46:51 +0000
ce537de3bcAccepting request 941644 from home:david.anes:branches:ApachePetr Gajdos2021-12-20 11:46:23 +0000
6a1697c3d5Accepting request 933435 from Apache
Dominique Leuenberger
2021-11-26 23:50:47 +0000
7ee7d2c634- httpd-framework updated to svn1894461 - added patches fix reverted logic, DirectorySlash NotFound is available in trunk only + apache-test-DirectorySlash-NotFound-logic.patch - do not consider php tests, they do not run anywayPetr Gajdos2021-11-24 11:09:35 +0000
ac59b1d5d0Accepting request 931489 from Apache
Dominique Leuenberger
2021-11-20 01:38:03 +0000
0befcf8746Accepting request 931327 from home:adkorte:branches:ApachePetr Gajdos2021-11-15 08:27:53 +0000
c5e8f6233eAccepting request 924154 from Apache
Richard Brown
2021-10-08 20:04:59 +0000
1679d306c2Accepting request 924064 from home:stroeder:networkPetr Gajdos2021-10-08 06:03:36 +0000
974ea42487Accepting request 923076 from home:stroeder:networkPetr Gajdos2021-10-05 08:25:59 +0000
1f0137ec7fAccepting request 919684 from Apache
Dominique Leuenberger
2021-09-21 19:12:26 +0000
d8f7f70594- version update to 2.4.49 *) core/mod_proxy/mod_ssl: Adding outgoing flag to conn_rec, indicating a connection is initiated by the server to somewhere, in contrast to incoming connections from clients. Adding 'ap_ssl_bind_outgoing() function that marks a connection as outgoing and is used by mod_proxy instead of the previous optional function ssl_engine_set. This enables other SSL module to secure proxy connections. The optional functions ssl_engine_set, ssl_engine_disable and ssl_proxy_enable are now provided by the core to have backward compatibility with non-httpd modules that might use them. mod_ssl itself no longer registers these functions, but keeps them in its header for backward compatibility. The core provided optional function wrap any registered function like it was done for ssl_is_ssl`. [Stefan Eissing] *) mod_ssl: Support logging private key material for use with wireshark via log file given by SSLKEYLOGFILE environment variable. Requires OpenSSL 1.1.1. PR 63391. [Joe Orton] *) mod_proxy: Do not canonicalize the proxied URL when both "nocanon" and "ProxyPassInterpolateEnv On" are configured. PR 65549. [Joel Self <joelself gmail.com>] *) mpm_event: Fix children processes possibly not stopped on graceful restart. PR 63169. [Joel Self <joelself gmail.com>] *) mod_proxy: Fix a potential infinite loop when tunneling Upgrade(d) protocols from mod_proxy_http, and a timeout triggering falsely when using mod_proxy_wstunnel, mod_proxy_connect or mod_proxy_http with upgrade= setting. PRs 65521 and 65519. [Yann Ylavic] *) mod_unique_id: Reduce the time window where duplicates may be generatedPetr Gajdos2021-09-17 08:39:47 +0000
2877b62871Accepting request 911090 from Apache
Richard Brown
2021-08-12 07:01:11 +0000