pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/www/apache24
Module Name: pkgsrc
Committed By: taca
Date: Tue May 5 00:12:30 UTC 2026
Modified Files:
pkgsrc/www/apache24: Makefile PLIST distinfo
pkgsrc/www/apache24/patches: patch-ad patch-ae patch-configure
Log Message:
www/apache24: update to 2.4.67
Changes with Apache 2.4.67 (2026-05-04)
* SECURITY: CVE-2026-34059: Apache HTTP Server: mod_proxy_ajp: Heap
Over-Read and memory disclosure in ajp_parse_data() (cve.mitre.org)
Buffer Over-read vulnerability in Apache HTTP Server. This issue affects
Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to
version 2.4.67, which fixes the issue. Credits: Elhanan Haenel
* SECURITY: CVE-2026-34032: Apache HTTP Server: mod_proxy_ajp: Heap Buffer
Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)
(cve.mitre.org) Improper Null Termination, Out-of-bounds Read
vulnerability in Apache HTTP Server. This issue affects Apache HTTP
Server: through 2.4.66. Users are recommended to upgrade to version
2.4.67, which fixes the issue. Credits: Tianshuo Han
(<hantianshuo233%gmail.com@localhost>)
* SECURITY: CVE-2026-33857: Apache HTTP Server: Off-by-one OOB reads in AJP
getter functions (cve.mitre.org) Out-of-bounds Read vulnerability in
mod_proxy_ajp of Apache HTTP Server. This issue affects Apache HTTP
Server: through 2.4.66. Users are recommended to upgrade to version
2.4.67, which fixes the issue. Credits: Elhanan Haenel
* SECURITY: CVE-2026-33523: Apache HTTP Server: multiple modules: HTTP
response splitting forwarding malicious status line (cve.mitre.org) HTTP
response splitting vulnerability in multiple Apache HTTP Server modules
with untrusted or compromised backend servers. This issue affects Apache
HTTP Server: from through 2.4.66. Users are recommended to upgrade to
version 2.4.67, which fixes the issue. Credits: Haruki Oyama (Waseda
University)
* SECURITY: CVE-2026-33007: Apache HTTP Server: mod_authn_socache crash
(cve.mitre.org) A NULL pointer dereference in the mod_authn_socache in
Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote
user to crash a child process in a caching forward proxy configuration.
Users are recommended to upgrade to version 2.4.67, which fixes this
issue. Credits: Pavel Kohout, Aisle Research, Aisle.com
* SECURITY: CVE-2026-33006: Apache HTTP Server: mod_auth_digest timing
attack (cve.mitre.org) A timing attack against mod_auth_digest in Apache
HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote
attacker. Users are recommended to upgrade to version 2.4.67, which fixes
this issue. Credits: Nitescu Lucian
* SECURITY: CVE-2026-29169: Apache HTTP Server: mod_dav_lock indirect lock
crash (cve.mitre.org) A NULL pointer dereference in mod_dav_lock in Apache
HTTP Server 2.4.66 and earlier may allow an attacker to crash the server
with a malicious request.mod_dav_lock is not used internally by mod_dav or
mod_dav_fs. The only known use-case for mod_dav_lock was mod_dav_svn from
Apache Subversion earlier than version 1.2.0. Users are recommended to
upgrade to version 2.4.66, which fixes this issue, or remove mod_dav_lock.
Credits: Pavel Kohout, Aisle Research, Aisle.com
* SECURITY: CVE-2026-29168: Apache HTTP Server: mod_md unrestricted OCSP
response (cve.mitre.org) Allocation of Resources Without Limits or
Throttling vulnerability in Apache HTTP Server's mod_md via OCSP response
data. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.66.
Users are recommended to upgrade to version 2.4.67, which fixes the issue.
Credits: Pavel Kohout, Aisle Research, Aisle.com
* SECURITY: CVE-2026-28780: Apache HTTP Server: buffer overflow in
mod_proxy_ajp via ajp_msg_check_header() (cve.mitre.org) Heap-based Buffer
Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server. If
mod_proxy_ajp connects to a malicious AJP server this AJP server can send
a malicious AJP message back to mod_proxy_ajp and cause it to write 4
attacker controlled bytes after the end of a heap based buffer. This
issue affects Apache HTTP Server: through 2.4.66. Users are recommended
to upgrade to version 2.4.67, which fixes the issue. Credits: Andrew
Lacambra
* SECURITY: CVE-2026-24072: Apache HTTP Server: mod_rewrite elevation of
privileges via ap_expr (cve.mitre.org) An escalation of privilege bug in
various modules in Apache HTTP 2.4.66 and earlier allows local .htaccess
authors to read files with the privileges of the httpd user. Users are
recommended to upgrade to version 2.4.67, which fixes this issue.
Credits: y7syeu
* SECURITY: CVE-2026-23918: Apache HTTP Server: http2: double free and
possible RCE on early reset (cve.mitre.org) Double Free and possible RCE
vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue
affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to
version 2.4.67, which fixes the issue. Credits: Bartlomiej Dmitruk,
striga.ai
* mod_md: update to version 2.6.10
- Fix issue #420 <https://github.com/icing/mod_md/issues/420> by ignoring
job.json files that claim to have completely finished a certificate
renewal, but have not produced the necessary result files.
* mod_http2: update to version 2.0.39
Remove streams own memory allocator after reports of memory problems with
third party modules. [Stefan Eissing]
* mod_http2: update to version 2.0.38
Source sync with mod_h2 github repository. No functional change. [Stefan
Eissing]
* Updated conf/mime.types: added vnd.sqlite3, HEIC, HEIF
[Alexandru Mărășteanu <hello alexei.ro>]
* mod_md: update to version 2.6.7
- Fix a regression in `MDStapleOthers` which broke in v2.6.0 and no longer
applied, no matter the configuration.
* mod_md: update to version 2.6.9
- Pebble 2.9+ reports another error when terms of service agreement is not
set. Treating all "userActionRequired" errors as permanent now.
* mod_md: update to version 2.6.8
- Fix the ARI related `replaces` property in ACME order creation to only
be used when the CA supports ARI and it is enabled in the menu config.
- Fix compatibility with APR versions before 1.6.0 which do not have
`apr_cstr_casecmp` and should use `apr_strnatcasecmp` instead.
* mod_http2: update to version 2.0.37
Prevent double purge of a stream, resulting in a double free. Fixes PR
69899. [Stefan Eissing]
* mod_md: Use correct function name when compiling against APR < 1.6.0.
PR 69954 [Tần Quảng <baobaoxich%gmail.com@localhost>]
To generate a diff of this commit:
cvs rdiff -u -r1.142 -r1.143 pkgsrc/www/apache24/Makefile
cvs rdiff -u -r1.38 -r1.39 pkgsrc/www/apache24/PLIST
cvs rdiff -u -r1.70 -r1.71 pkgsrc/www/apache24/distinfo
cvs rdiff -u -r1.2 -r1.3 pkgsrc/www/apache24/patches/patch-ad
cvs rdiff -u -r1.1.1.1 -r1.2 pkgsrc/www/apache24/patches/patch-ae
cvs rdiff -u -r1.5 -r1.6 pkgsrc/www/apache24/patches/patch-configure
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/www/apache24/Makefile
diff -u pkgsrc/www/apache24/Makefile:1.142 pkgsrc/www/apache24/Makefile:1.143
--- pkgsrc/www/apache24/Makefile:1.142 Fri Feb 6 10:06:06 2026
+++ pkgsrc/www/apache24/Makefile Tue May 5 00:12:30 2026
@@ -1,13 +1,12 @@
-# $NetBSD: Makefile,v 1.142 2026/02/06 10:06:06 wiz Exp $
+# $NetBSD: Makefile,v 1.143 2026/05/05 00:12:30 taca Exp $
#
# When updating this package, make sure that no strings like
# "PR 12345" are in the commit message. Upstream likes
# to reference their own PRs this way, but this ends up
# in NetBSD GNATS.
-DISTNAME= httpd-2.4.66
+DISTNAME= httpd-2.4.67
PKGNAME= ${DISTNAME:S/httpd/apache/}
-PKGREVISION= 2
CATEGORIES= www
MASTER_SITES= ${MASTER_SITE_APACHE:=httpd/}
EXTRACT_SUFX= .tar.bz2
Index: pkgsrc/www/apache24/PLIST
diff -u pkgsrc/www/apache24/PLIST:1.38 pkgsrc/www/apache24/PLIST:1.39
--- pkgsrc/www/apache24/PLIST:1.38 Sun Dec 7 15:55:55 2025
+++ pkgsrc/www/apache24/PLIST Tue May 5 00:12:30 2026
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.38 2025/12/07 15:55:55 taca Exp $
+@comment $NetBSD: PLIST,v 1.39 2026/05/05 00:12:30 taca Exp $
bin/ab
bin/apxs
bin/dbmmanage
@@ -553,6 +553,8 @@ share/httpd/manual/developer/hooks.html.
share/httpd/manual/developer/index.html
share/httpd/manual/developer/index.html.en
share/httpd/manual/developer/index.html.zh-cn.utf8
+share/httpd/manual/developer/mod_example_1.c
+share/httpd/manual/developer/mod_example_2.c
share/httpd/manual/developer/modguide.html
share/httpd/manual/developer/modguide.html.en
share/httpd/manual/developer/modules.html
@@ -1377,10 +1379,6 @@ share/httpd/manual/platform/netware.html
share/httpd/manual/platform/netware.html.en
share/httpd/manual/platform/netware.html.fr.utf8
share/httpd/manual/platform/netware.html.ko.euc-kr
-share/httpd/manual/platform/perf-hp.html
-share/httpd/manual/platform/perf-hp.html.en
-share/httpd/manual/platform/perf-hp.html.fr.utf8
-share/httpd/manual/platform/perf-hp.html.ko.euc-kr
share/httpd/manual/platform/rpm.html
share/httpd/manual/platform/rpm.html.en
share/httpd/manual/platform/rpm.html.fr.utf8
Index: pkgsrc/www/apache24/distinfo
diff -u pkgsrc/www/apache24/distinfo:1.70 pkgsrc/www/apache24/distinfo:1.71
--- pkgsrc/www/apache24/distinfo:1.70 Sun Dec 7 15:55:55 2025
+++ pkgsrc/www/apache24/distinfo Tue May 5 00:12:30 2026
@@ -1,16 +1,16 @@
-$NetBSD: distinfo,v 1.70 2025/12/07 15:55:55 taca Exp $
+$NetBSD: distinfo,v 1.71 2026/05/05 00:12:30 taca Exp $
-BLAKE2s (httpd-2.4.66.tar.bz2) = dd4c444d80320c65ec0d154e5f15468b2d10c2e5c87285ef6de4204689cf3564
-SHA512 (httpd-2.4.66.tar.bz2) = 49031a3465d956ee3b755e65810b6c35561ddd5fac2c624a273b733c238e115b914cd7b246837e5a3090ccfded6e0b8b3059bfd1f8ce4419081c805a38d05a4b
-Size (httpd-2.4.66.tar.bz2) = 7504564 bytes
+BLAKE2s (httpd-2.4.67.tar.bz2) = f7ba66aa40f0c8b494cf526293041219a048ee43be6c8ba42e31fbce2eefd93f
+SHA512 (httpd-2.4.67.tar.bz2) = 5ae29fc8edb253453271613cb18754de0d943d1f82361059c81f8ebe1f057b894675506550bd1341bfa9416226b569a7bac08f497c53e8bb6dede87f4f41eae4
+Size (httpd-2.4.67.tar.bz2) = 7493067 bytes
SHA1 (patch-aa) = 9a66685f1d2e4710ab464beda98cbaad632aebf9
-SHA1 (patch-ad) = 4ba4a9c812951f533fa316e5dbf17eaab5494157
-SHA1 (patch-ae) = 5bd3bf54e792bf8a2916d7e1b49b1702b02c6903
+SHA1 (patch-ad) = dd4dbffaa8d784bbbf37b85e17977ff0c73e9074
+SHA1 (patch-ae) = 0a54d96ca77394b1ca725df76819caa95c381f39
SHA1 (patch-ag) = 50c7f0fab1cb90ac573f1c47f2d37f9c2a6247e1
SHA1 (patch-ai) = d3870e46e41adc97c3fce86f9ffd224502ad6b0c
SHA1 (patch-al) = 02d9ade5aac4270182063d5ad413970c832ee911
SHA1 (patch-am) = acdf7198ae8b4353cfc70c8015a0f09de036b777
SHA1 (patch-aw) = 43cd64df886853ef7b75b91ed20183f329fcc9df
-SHA1 (patch-configure) = d529df410f564571a8cc7c2a31c3b446479a71df
+SHA1 (patch-configure) = 4fc4083c601f67205a10c6d887b69026268c8575
SHA1 (patch-include_ap__config.h) = 1d056e2d4db80ec97aaf755b6dd6aff69ed2cd96
SHA1 (patch-modules_filters_mod_substitute.c) = d47ee06e70942ab522acf119eb2c4b313aed9bbd
Index: pkgsrc/www/apache24/patches/patch-ad
diff -u pkgsrc/www/apache24/patches/patch-ad:1.2 pkgsrc/www/apache24/patches/patch-ad:1.3
--- pkgsrc/www/apache24/patches/patch-ad:1.2 Mon Feb 25 21:16:38 2013
+++ pkgsrc/www/apache24/patches/patch-ad Tue May 5 00:12:30 2026
@@ -1,4 +1,6 @@
-$NetBSD: patch-ad,v 1.2 2013/02/25 21:16:38 ryoon Exp $
+$NetBSD: patch-ad,v 1.3 2026/05/05 00:12:30 taca Exp $
+
+Add layout for NetBSD.
--- config.layout.orig 2012-04-17 14:01:41.000000000 +0000
+++ config.layout
Index: pkgsrc/www/apache24/patches/patch-ae
diff -u pkgsrc/www/apache24/patches/patch-ae:1.1.1.1 pkgsrc/www/apache24/patches/patch-ae:1.2
--- pkgsrc/www/apache24/patches/patch-ae:1.1.1.1 Fri Apr 13 18:50:49 2012
+++ pkgsrc/www/apache24/patches/patch-ae Tue May 5 00:12:30 2026
@@ -1,8 +1,10 @@
-$NetBSD: patch-ae,v 1.1.1.1 2012/04/13 18:50:49 ryoon Exp $
+$NetBSD: patch-ae,v 1.2 2026/05/05 00:12:30 taca Exp $
---- docs/conf/httpd.conf.in.orig 2012-02-06 16:55:22.000000000 +0000
+Directory structure for pkgsrc.
+
+--- docs/conf/httpd.conf.in.orig 2026-03-16 06:19:31.000000000 +0000
+++ docs/conf/httpd.conf.in
-@@ -361,42 +361,42 @@ LogLevel warn
+@@ -370,42 +370,42 @@ LogLevel warn
# necessary.
# Server-pool management (MPM specific)
@@ -55,5 +57,5 @@ $NetBSD: patch-ae,v 1.1.1.1 2012/04/13 1
-#Include @rel_sysconfdir@/extra/httpd-ssl.conf
+#Include @rel_sysconfdir@/httpd-ssl.conf
#
- # Note: The following must must be present to support
+ # Note: The following must be present to support
# starting without SSL on platforms with no /dev/random equivalent
Index: pkgsrc/www/apache24/patches/patch-configure
diff -u pkgsrc/www/apache24/patches/patch-configure:1.5 pkgsrc/www/apache24/patches/patch-configure:1.6
--- pkgsrc/www/apache24/patches/patch-configure:1.5 Fri Apr 5 09:31:38 2024
+++ pkgsrc/www/apache24/patches/patch-configure Tue May 5 00:12:30 2026
@@ -1,9 +1,9 @@
-$NetBSD: patch-configure,v 1.5 2024/04/05 09:31:38 adam Exp $
+$NetBSD: patch-configure,v 1.6 2026/05/05 00:12:30 taca Exp $
---- configure.orig 2024-04-03 12:22:44.000000000 +0000
+--- configure.orig 2026-04-28 18:15:03.000000000 +0000
+++ configure
-@@ -42821,7 +42821,6 @@ printf "%s\n" "#define SERVER_CONFIG_FIL
- printf "%s\n" "#define AP_TYPES_CONFIG_FILE \"${rel_sysconfdir}/mime.types\"" >>confdefs.h
+@@ -42456,7 +42456,6 @@ cat >>confdefs.h <<_ACEOF
+ _ACEOF
-perlbin=`$ac_aux_dir/PrintPath perl`
Home |
Main Index |
Thread Index |
Old Index