Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id 58737A6DD2 for ; Wed, 23 Jul 2014 10:34:15 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id 9C21314A1B2; Wed, 23 Jul 2014 10:34:14 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 3E0EE14A1AF for ; Wed, 23 Jul 2014 10:34:04 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id q8kDwAn-4FIl for ; Wed, 23 Jul 2014 10:34:02 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id BBFFC14A1AD for ; Wed, 23 Jul 2014 10:34:02 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id 54B1B96; Wed, 23 Jul 2014 10:34:02 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" MIME-Version: 1.0 Date: Wed, 23 Jul 2014 10:34:02 +0000 From: "Matthias Scheler" Subject: CVS commit: pkgsrc/www/apache24 To: pkgsrc-changes@NetBSD.org Reply-To: tron@netbsd.org X-Mailer: log_accum Message-Id: <20140723103402.54B1B96@cvs.netbsd.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: tron Date: Wed Jul 23 10:34:02 UTC 2014 Modified Files: pkgsrc/www/apache24: Makefile PLIST distinfo Log Message: Update "apache24" package to version 2.4.10. Changes since 2.4.9: - SECURITY: CVE-2014-0117 (cve.mitre.org) mod_proxy: Fix crash in Connection header handling which allowed a denial of service attack against a reverse proxy with a threaded MPM. [Ben Reser] - SECURITY: CVE-2014-0226 (cve.mitre.org) Fix a race condition in scoreboard handling, which could lead to a heap buffer overflow. [Joe Orton, Eric Covener] - SECURITY: CVE-2014-0118 (cve.mitre.org) mod_deflate: The DEFLATE input filter (inflates request bodies) now limits the length and compression ratio of inflated request bodies to avoid denial of sevice via highly compressed bodies. See directives DeflateInflateLimitRequestBody, DeflateInflateRatioLimit, and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener] - SECURITY: CVE-2014-0231 (cve.mitre.org) mod_cgid: Fix a denial of service against CGI scripts that do not consume stdin that could lead to lingering HTTPD child processes filling up the scoreboard and eventually hanging the server. By default, the client I/O timeout (Timeout directive) now applies to communication with scripts. The CGIDScriptTimeout directive can be used to set a different timeout for communication with scripts. [Rainer Jung, Eric Covener, Yann Ylavic] - mod_ssl: Extend the scope of SSLSessionCacheTimeout to sessions resumed by TLS session resumption (RFC 5077). [Rainer Jung] - mod_deflate: Don't fail when flushing inflated data to the user-agent and that coincides with the end of stream ("Zlib error flushing inflate buffer"). Bug 56196. [Christoph Fausak ] - mod_proxy_ajp: Forward local IP address as a custom request attribute like we already do for the remote port. [Rainer Jung] - core: Include any error notes set by modules in the canned error response for 403 errors. [Jeff Trawick] - mod_ssl: Set an error note for requests rejected due to SSLStrictSNIVHostCheck. [Jeff Trawick] - mod_ssl: Fix issue with redirects to error documents when handling SNI errors. [Jeff Trawick] - mod_ssl: Fix tmp DH parameter leak, adjust selection to prefer larger keys and support up to 8192-bit keys. [Ruediger Pluem, Joe Orton] - mod_dav: Fix improper encoding in PROPFIND responses. Bug 56480. [Ben Reser] - WinNT MPM: Improve error handling for termination events in child. [Jeff Trawick] - mod_proxy: When ping/pong is configured for a worker, don't send or forward "100 Continue" (interim) response to the client if it does not expect one. [Yann Ylavic] - mod_ldap: Be more conservative with the last-used time for LDAPConnectionPoolTTL. Bug 54587 [Eric Covener] - mod_ldap: LDAP connections used for authn were not respecting LDAPConnectionPoolTTL. Bug 54587 [Eric Covener] - mod_proxy_fcgi: Fix occasional high CPU when handling request bodies. [Jeff Trawick] - event MPM: Fix possible crashes (third-party modules accessing c->sbh) or occasional missed mod_status updates under load. Bug 56639. [Edward Lu ] - mod_authnz_ldap: Support primitive LDAP servers do not accept filters, such as "SDBM-backed LDAP" on z/OS, by allowing a special filter "none" to be specified in AuthLDAPURL. [Eric Covener] - mod_deflate: Fix inflation of files larger than 4GB. Bug 56062. [Lukas Bezdicka ] - mod_deflate: Handle Zlib header and validation bytes received in multiple chunks. Bug 46146. [Yann Ylavic] - mod_proxy: Allow reverse-proxy to be set via explicit handler. [ryo takatsuki ] - ab: support custom HTTP method with -m argument. Bug 56604. [Roman Jurkov ] - mod_proxy_balancer: Correctly encode user provided data in management interface. Bug 56532 [Maksymilian, ] - mod_proxy_fcgi: Support iobuffersize parameter. [Jeff Trawick] - mod_auth_form: Add a debug message when the fields on a form are not recognised. [Graham Leggett] - mod_cache: Preserve non-cacheable headers forwarded from an origin 304 response. Bug 55547. [Yann Ylavic] - mod_proxy_wstunnel: Fix the use of SSL connections with the "wss:" scheme. Bug 55320. [Alex Liu ] - mod_socache_shmcb: Correct counting of expirations for status display. Expirations happening during retrieval were not counted. [Rainer Jung] - mod_cache: Retry unconditional request with the full URL (including the query-string) when the origin server's 304 response does not match the conditions used to revalidate the stale entry. [Yann Ylavic]. - mod_alias: Stop setting CONTEXT_PREFIX and CONTEXT_DOCUMENT environment variables as a result of AliasMatch. [Eric Covener] - mod_cache: Don't add cached/revalidated entity headers to a 304 response. Bug 55547. [Yann Ylavic] - mod_proxy_scgi: Support Unix sockets. ap_proxy_port_of_scheme(): Support default SCGI port (4000). [Jeff Trawick] - mod_expires: don't add Expires header to error responses (4xx/5xx), be they generated or forwarded. Bug 55669. [Yann Ylavic] - mod_proxy_fcgi: Don't segfault when failing to connect to the backend. (regression in 2.4.9 release) [Jeff Trawick] - mod_authn_socache: Fix crash at startup in certain configurations. Bug 56371. (regression in 2.4.7) [Jan Kaluza] - mod_ssl: restore argument structure for "exec"-type SSLPassPhraseDialog programs to the form used in releases up to 2.4.7, and emulate a backwards-compatible behavior for existing setups. [Kaspar Brand] - mod_ssl: Add SSLOCSPUseRequestNonce directive to control whether or not OCSP requests should use a nonce to be checked against the responder's one. Bug 56233. [Yann Ylavic, Kaspar Brand] - mod_ssl: "SSLEngine off" will now override a Listen-based default and does disable mod_ssl for the vhost. [Joe Orton] - mod_lua: Enforce the max post size allowed via r:parsebody() [Daniel Gruno] - mod_lua: Use binary comparison to find boundaries for multipart objects, as to not terminate our search prematurely when hitting a NULL byte. [Daniel Gruno] - mod_ssl: add workaround for SSLCertificateFile when using OpenSSL versions before 0.9.8h and not specifying an SSLCertificateChainFile (regression introduced with 2.4.8). Bug 56410. [Kaspar Brand] - mod_ssl: bring SNI behavior into better conformance with RFC 6066: no longer send warning-level unrecognized_name(112) alerts, and limit startup warnings to cases where an OpenSSL version without TLS extension support is used. Bug 56241. [Kaspar Brand] - mod_proxy_html: Avoid some possible memory access violation in case of specially crafted files, when the ProxyHTMLMeta directive is turned on. Follow up of Bug 56287 [Christophe Jaillet] - mod_auth_form: Make sure the optional functions are loaded even when the AuthFormProvider isn't specified. [Graham Leggett] - mod_ssl: avoid processing bogus SSLCertificateKeyFile values (and logging garbled file names). Bug 56306. [Kaspar Brand] - mod_ssl: fix merging of global and vhost-level settings with the SSLCertificateFile, SSLCertificateKeyFile, and SSLOpenSSLConfCmd directives. Bug 56353. [Kaspar Brand] - mod_headers: Allow the "value" parameter of Header and RequestHeader to contain an ap_expr expression if prefixed with "expr=". [Eric Covener] - rotatelogs: Avoid creation of zombie processes when -p is used on Unix platforms. [Joe Orton] - mod_authnz_fcgi: New module to enable FastCGI authorizer applications to authenticate and/or authorize clients. [Jeff Trawick] - mod_proxy: Do not try to parse the regular expressions passed by ProxyPassMatch as URL as they do not follow their syntax. Bug 56074. [Ruediger Pluem] - mod_reqtimeout: Resolve unexpected timeouts on keepalive requests under the Event MPM. Bug 56216. [Frank Meier ] - mod_proxy_fcgi: Fix sending of response without some HTTP headers that might be set by filters. [Jim Riggs ] - mod_proxy_html: Do not delete the wrong data from HTML code when a "http-equiv" meta tag specifies a Content-Type behind any other "http-equiv" meta tag. Bug 56287 [Micha Lenk ] - mod_proxy: Don't reuse a SSL backend connection whose requested SNI differs. Bug 55782. [Yann Ylavic] - Add suspend_connection and resume_connection hooks to notify modules when the thread/connection relationship changes. (Should be implemented for any third-party async MPMs.) [Jeff Trawick] - mod_proxy_wstunnel: Don't issue AH02447 and log a 500 on routine hangups from websockets origin servers. Bug 56299 [Yann Ylavic, Edward Lu , Eric Covener] - mod_proxy_wstunnel: Don't pool backend websockets connections, because we need to handshake every time. Bug 55890. [Eric Covener] - mod_lua: Redesign how request record table access behaves, in order to utilize the request record from within these tables. [Daniel Gruno] - mod_lua: Add r:wspeek for peeking at WebSocket frames. [Daniel Gruno] - mod_lua: Log an error when the initial parsing of a Lua file fails. [Daniel Gruno, Felipe Daragon ] - mod_lua: Reformat and escape script error output. [Daniel Gruno, Felipe Daragon ] - mod_lua: URL-escape cookie keys/values to prevent tainted cookie data from causing response splitting. [Daniel Gruno, Felipe Daragon ] - mod_lua: Disallow newlines in table values inside the request_rec, to prevent HTTP Response Splitting via tainted headers. [Daniel Gruno, Felipe Daragon ] - mod_lua: Remove the non-working early/late arguments for LuaHookCheckUserID. [Daniel Gruno] - mod_lua: Change IVM storage to use shm [Daniel Gruno] - mod_lua: More verbose error logging when a handler function cannot be found. [Daniel Gruno] To generate a diff of this commit: cvs rdiff -u -r1.29 -r1.30 pkgsrc/www/apache24/Makefile cvs rdiff -u -r1.15 -r1.16 pkgsrc/www/apache24/PLIST cvs rdiff -u -r1.14 -r1.15 pkgsrc/www/apache24/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.