pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/www/apache24



Module Name:    pkgsrc
Committed By:   taca
Date:           Tue May  5 00:12:30 UTC 2026

Modified Files:
        pkgsrc/www/apache24: Makefile PLIST distinfo
        pkgsrc/www/apache24/patches: patch-ad patch-ae patch-configure

Log Message:
www/apache24: update to 2.4.67

Changes with Apache 2.4.67 (2026-05-04)

* SECURITY: CVE-2026-34059: Apache HTTP Server: mod_proxy_ajp: Heap
  Over-Read and memory disclosure in ajp_parse_data() (cve.mitre.org)
  Buffer Over-read vulnerability in Apache HTTP Server.  This issue affects
  Apache HTTP Server: through 2.4.66.  Users are recommended to upgrade to
  version 2.4.67, which fixes the issue.  Credits: Elhanan Haenel

* SECURITY: CVE-2026-34032: Apache HTTP Server: mod_proxy_ajp: Heap Buffer
  Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)
  (cve.mitre.org) Improper Null Termination, Out-of-bounds Read
  vulnerability in Apache HTTP Server.  This issue affects Apache HTTP
  Server: through 2.4.66.  Users are recommended to upgrade to version
  2.4.67, which fixes the issue.  Credits: Tianshuo Han
  (<hantianshuo233%gmail.com@localhost>)

* SECURITY: CVE-2026-33857: Apache HTTP Server: Off-by-one OOB reads in AJP
  getter functions (cve.mitre.org) Out-of-bounds Read vulnerability in
  mod_proxy_ajp of Apache HTTP Server.  This issue affects Apache HTTP
  Server: through 2.4.66.  Users are recommended to upgrade to version
  2.4.67, which fixes the issue.  Credits: Elhanan Haenel

* SECURITY: CVE-2026-33523: Apache HTTP Server: multiple modules: HTTP
  response splitting forwarding malicious status line (cve.mitre.org) HTTP
  response splitting vulnerability in multiple Apache HTTP Server modules
  with untrusted or compromised backend servers.  This issue affects Apache
  HTTP Server: from through 2.4.66.  Users are recommended to upgrade to
  version 2.4.67, which fixes the issue.  Credits: Haruki Oyama (Waseda
  University)

* SECURITY: CVE-2026-33007: Apache HTTP Server: mod_authn_socache crash
  (cve.mitre.org) A NULL pointer dereference in the mod_authn_socache in
  Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote
  user to crash a child process in a caching forward proxy configuration.
  Users are recommended to upgrade to version 2.4.67, which fixes this
  issue.  Credits: Pavel Kohout, Aisle Research, Aisle.com

* SECURITY: CVE-2026-33006: Apache HTTP Server: mod_auth_digest timing
  attack (cve.mitre.org) A timing attack against mod_auth_digest in Apache
  HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote
  attacker.  Users are recommended to upgrade to version 2.4.67, which fixes
  this issue.  Credits: Nitescu Lucian

* SECURITY: CVE-2026-29169: Apache HTTP Server: mod_dav_lock indirect lock
  crash (cve.mitre.org) A NULL pointer dereference in mod_dav_lock in Apache
  HTTP Server 2.4.66 and earlier may allow an attacker to crash the server
  with a malicious request.mod_dav_lock is not used internally by mod_dav or
  mod_dav_fs.  The only known use-case for mod_dav_lock was mod_dav_svn from
  Apache Subversion earlier than version 1.2.0.  Users are recommended to
  upgrade to version 2.4.66, which fixes this issue, or remove mod_dav_lock.
  Credits: Pavel Kohout, Aisle Research, Aisle.com

* SECURITY: CVE-2026-29168: Apache HTTP Server: mod_md unrestricted OCSP
  response (cve.mitre.org) Allocation of Resources Without Limits or
  Throttling vulnerability in Apache HTTP Server's mod_md via OCSP response
  data.  This issue affects Apache HTTP Server: from 2.4.30 through 2.4.66.
  Users are recommended to upgrade to version 2.4.67, which fixes the issue.
  Credits: Pavel Kohout, Aisle Research, Aisle.com

* SECURITY: CVE-2026-28780: Apache HTTP Server: buffer overflow in
  mod_proxy_ajp via ajp_msg_check_header() (cve.mitre.org) Heap-based Buffer
  Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server.  If
  mod_proxy_ajp connects to a malicious AJP server this AJP server can send
  a malicious AJP message back to mod_proxy_ajp and cause it to write 4
  attacker controlled bytes after the end of a heap based buffer.  This
  issue affects Apache HTTP Server: through 2.4.66.  Users are recommended
  to upgrade to version 2.4.67, which fixes the issue.  Credits: Andrew
  Lacambra

* SECURITY: CVE-2026-24072: Apache HTTP Server: mod_rewrite elevation of
  privileges via ap_expr (cve.mitre.org) An escalation of privilege bug in
  various modules in Apache HTTP 2.4.66 and earlier allows local .htaccess
  authors to read files with the privileges of the httpd user.  Users are
  recommended to upgrade to version 2.4.67, which fixes this issue.
  Credits: y7syeu

* SECURITY: CVE-2026-23918: Apache HTTP Server: http2: double free and
  possible RCE on early reset (cve.mitre.org) Double Free and possible RCE
  vulnerability in Apache HTTP Server with the HTTP/2 protocol.  This issue
  affects Apache HTTP Server: 2.4.66.  Users are recommended to upgrade to
  version 2.4.67, which fixes the issue.  Credits: Bartlomiej Dmitruk,
  striga.ai

* mod_md: update to version 2.6.10
  - Fix issue #420 <https://github.com/icing/mod_md/issues/420> by ignoring
    job.json files that claim to have completely finished a certificate
    renewal, but have not produced the necessary result files.

* mod_http2: update to version 2.0.39
  Remove streams own memory allocator after reports of memory problems with
  third party modules.  [Stefan Eissing]

* mod_http2: update to version 2.0.38
  Source sync with mod_h2 github repository. No functional change.  [Stefan
  Eissing]

* Updated conf/mime.types: added vnd.sqlite3, HEIC, HEIF
  [Alexandru Mărășteanu <hello alexei.ro>]

* mod_md: update to version 2.6.7
  - Fix a regression in `MDStapleOthers` which broke in v2.6.0 and no longer
    applied, no matter the configuration.

* mod_md: update to version 2.6.9
  - Pebble 2.9+ reports another error when terms of service agreement is not
    set. Treating all "userActionRequired" errors as permanent now.

* mod_md: update to version 2.6.8
  - Fix the ARI related `replaces` property in ACME order creation to only
    be used when the CA supports ARI and it is enabled in the menu config.
  - Fix compatibility with APR versions before 1.6.0 which do not have
    `apr_cstr_casecmp` and should use `apr_strnatcasecmp` instead.

* mod_http2: update to version 2.0.37
  Prevent double purge of a stream, resulting in a double free.  Fixes PR
  69899.  [Stefan Eissing]

* mod_md: Use correct function name when compiling against APR < 1.6.0.
  PR 69954 [Tần Quảng <baobaoxich%gmail.com@localhost>]


To generate a diff of this commit:
cvs rdiff -u -r1.142 -r1.143 pkgsrc/www/apache24/Makefile
cvs rdiff -u -r1.38 -r1.39 pkgsrc/www/apache24/PLIST
cvs rdiff -u -r1.70 -r1.71 pkgsrc/www/apache24/distinfo
cvs rdiff -u -r1.2 -r1.3 pkgsrc/www/apache24/patches/patch-ad
cvs rdiff -u -r1.1.1.1 -r1.2 pkgsrc/www/apache24/patches/patch-ae
cvs rdiff -u -r1.5 -r1.6 pkgsrc/www/apache24/patches/patch-configure

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/www/apache24/Makefile
diff -u pkgsrc/www/apache24/Makefile:1.142 pkgsrc/www/apache24/Makefile:1.143
--- pkgsrc/www/apache24/Makefile:1.142  Fri Feb  6 10:06:06 2026
+++ pkgsrc/www/apache24/Makefile        Tue May  5 00:12:30 2026
@@ -1,13 +1,12 @@
-# $NetBSD: Makefile,v 1.142 2026/02/06 10:06:06 wiz Exp $
+# $NetBSD: Makefile,v 1.143 2026/05/05 00:12:30 taca Exp $
 #
 # When updating this package, make sure that no strings like
 # "PR 12345" are in the commit message. Upstream likes
 # to reference their own PRs this way, but this ends up
 # in NetBSD GNATS.
 
-DISTNAME=      httpd-2.4.66
+DISTNAME=      httpd-2.4.67
 PKGNAME=       ${DISTNAME:S/httpd/apache/}
-PKGREVISION=   2
 CATEGORIES=    www
 MASTER_SITES=  ${MASTER_SITE_APACHE:=httpd/}
 EXTRACT_SUFX=  .tar.bz2

Index: pkgsrc/www/apache24/PLIST
diff -u pkgsrc/www/apache24/PLIST:1.38 pkgsrc/www/apache24/PLIST:1.39
--- pkgsrc/www/apache24/PLIST:1.38      Sun Dec  7 15:55:55 2025
+++ pkgsrc/www/apache24/PLIST   Tue May  5 00:12:30 2026
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.38 2025/12/07 15:55:55 taca Exp $
+@comment $NetBSD: PLIST,v 1.39 2026/05/05 00:12:30 taca Exp $
 bin/ab
 bin/apxs
 bin/dbmmanage
@@ -553,6 +553,8 @@ share/httpd/manual/developer/hooks.html.
 share/httpd/manual/developer/index.html
 share/httpd/manual/developer/index.html.en
 share/httpd/manual/developer/index.html.zh-cn.utf8
+share/httpd/manual/developer/mod_example_1.c
+share/httpd/manual/developer/mod_example_2.c
 share/httpd/manual/developer/modguide.html
 share/httpd/manual/developer/modguide.html.en
 share/httpd/manual/developer/modules.html
@@ -1377,10 +1379,6 @@ share/httpd/manual/platform/netware.html
 share/httpd/manual/platform/netware.html.en
 share/httpd/manual/platform/netware.html.fr.utf8
 share/httpd/manual/platform/netware.html.ko.euc-kr
-share/httpd/manual/platform/perf-hp.html
-share/httpd/manual/platform/perf-hp.html.en
-share/httpd/manual/platform/perf-hp.html.fr.utf8
-share/httpd/manual/platform/perf-hp.html.ko.euc-kr
 share/httpd/manual/platform/rpm.html
 share/httpd/manual/platform/rpm.html.en
 share/httpd/manual/platform/rpm.html.fr.utf8

Index: pkgsrc/www/apache24/distinfo
diff -u pkgsrc/www/apache24/distinfo:1.70 pkgsrc/www/apache24/distinfo:1.71
--- pkgsrc/www/apache24/distinfo:1.70   Sun Dec  7 15:55:55 2025
+++ pkgsrc/www/apache24/distinfo        Tue May  5 00:12:30 2026
@@ -1,16 +1,16 @@
-$NetBSD: distinfo,v 1.70 2025/12/07 15:55:55 taca Exp $
+$NetBSD: distinfo,v 1.71 2026/05/05 00:12:30 taca Exp $
 
-BLAKE2s (httpd-2.4.66.tar.bz2) = dd4c444d80320c65ec0d154e5f15468b2d10c2e5c87285ef6de4204689cf3564
-SHA512 (httpd-2.4.66.tar.bz2) = 49031a3465d956ee3b755e65810b6c35561ddd5fac2c624a273b733c238e115b914cd7b246837e5a3090ccfded6e0b8b3059bfd1f8ce4419081c805a38d05a4b
-Size (httpd-2.4.66.tar.bz2) = 7504564 bytes
+BLAKE2s (httpd-2.4.67.tar.bz2) = f7ba66aa40f0c8b494cf526293041219a048ee43be6c8ba42e31fbce2eefd93f
+SHA512 (httpd-2.4.67.tar.bz2) = 5ae29fc8edb253453271613cb18754de0d943d1f82361059c81f8ebe1f057b894675506550bd1341bfa9416226b569a7bac08f497c53e8bb6dede87f4f41eae4
+Size (httpd-2.4.67.tar.bz2) = 7493067 bytes
 SHA1 (patch-aa) = 9a66685f1d2e4710ab464beda98cbaad632aebf9
-SHA1 (patch-ad) = 4ba4a9c812951f533fa316e5dbf17eaab5494157
-SHA1 (patch-ae) = 5bd3bf54e792bf8a2916d7e1b49b1702b02c6903
+SHA1 (patch-ad) = dd4dbffaa8d784bbbf37b85e17977ff0c73e9074
+SHA1 (patch-ae) = 0a54d96ca77394b1ca725df76819caa95c381f39
 SHA1 (patch-ag) = 50c7f0fab1cb90ac573f1c47f2d37f9c2a6247e1
 SHA1 (patch-ai) = d3870e46e41adc97c3fce86f9ffd224502ad6b0c
 SHA1 (patch-al) = 02d9ade5aac4270182063d5ad413970c832ee911
 SHA1 (patch-am) = acdf7198ae8b4353cfc70c8015a0f09de036b777
 SHA1 (patch-aw) = 43cd64df886853ef7b75b91ed20183f329fcc9df
-SHA1 (patch-configure) = d529df410f564571a8cc7c2a31c3b446479a71df
+SHA1 (patch-configure) = 4fc4083c601f67205a10c6d887b69026268c8575
 SHA1 (patch-include_ap__config.h) = 1d056e2d4db80ec97aaf755b6dd6aff69ed2cd96
 SHA1 (patch-modules_filters_mod_substitute.c) = d47ee06e70942ab522acf119eb2c4b313aed9bbd

Index: pkgsrc/www/apache24/patches/patch-ad
diff -u pkgsrc/www/apache24/patches/patch-ad:1.2 pkgsrc/www/apache24/patches/patch-ad:1.3
--- pkgsrc/www/apache24/patches/patch-ad:1.2    Mon Feb 25 21:16:38 2013
+++ pkgsrc/www/apache24/patches/patch-ad        Tue May  5 00:12:30 2026
@@ -1,4 +1,6 @@
-$NetBSD: patch-ad,v 1.2 2013/02/25 21:16:38 ryoon Exp $
+$NetBSD: patch-ad,v 1.3 2026/05/05 00:12:30 taca Exp $
+
+Add layout for NetBSD.
 
 --- config.layout.orig 2012-04-17 14:01:41.000000000 +0000
 +++ config.layout

Index: pkgsrc/www/apache24/patches/patch-ae
diff -u pkgsrc/www/apache24/patches/patch-ae:1.1.1.1 pkgsrc/www/apache24/patches/patch-ae:1.2
--- pkgsrc/www/apache24/patches/patch-ae:1.1.1.1        Fri Apr 13 18:50:49 2012
+++ pkgsrc/www/apache24/patches/patch-ae        Tue May  5 00:12:30 2026
@@ -1,8 +1,10 @@
-$NetBSD: patch-ae,v 1.1.1.1 2012/04/13 18:50:49 ryoon Exp $
+$NetBSD: patch-ae,v 1.2 2026/05/05 00:12:30 taca Exp $
 
---- docs/conf/httpd.conf.in.orig       2012-02-06 16:55:22.000000000 +0000
+Directory structure for pkgsrc.
+
+--- docs/conf/httpd.conf.in.orig       2026-03-16 06:19:31.000000000 +0000
 +++ docs/conf/httpd.conf.in
-@@ -361,42 +361,42 @@ LogLevel warn
+@@ -370,42 +370,42 @@ LogLevel warn
  # necessary.
  
  # Server-pool management (MPM specific)
@@ -55,5 +57,5 @@ $NetBSD: patch-ae,v 1.1.1.1 2012/04/13 1
 -#Include @rel_sysconfdir@/extra/httpd-ssl.conf
 +#Include @rel_sysconfdir@/httpd-ssl.conf
  #
- # Note: The following must must be present to support
+ # Note: The following must be present to support
  #       starting without SSL on platforms with no /dev/random equivalent

Index: pkgsrc/www/apache24/patches/patch-configure
diff -u pkgsrc/www/apache24/patches/patch-configure:1.5 pkgsrc/www/apache24/patches/patch-configure:1.6
--- pkgsrc/www/apache24/patches/patch-configure:1.5     Fri Apr  5 09:31:38 2024
+++ pkgsrc/www/apache24/patches/patch-configure Tue May  5 00:12:30 2026
@@ -1,9 +1,9 @@
-$NetBSD: patch-configure,v 1.5 2024/04/05 09:31:38 adam Exp $
+$NetBSD: patch-configure,v 1.6 2026/05/05 00:12:30 taca Exp $
 
---- configure.orig     2024-04-03 12:22:44.000000000 +0000
+--- configure.orig     2026-04-28 18:15:03.000000000 +0000
 +++ configure
-@@ -42821,7 +42821,6 @@ printf "%s\n" "#define SERVER_CONFIG_FIL
- printf "%s\n" "#define AP_TYPES_CONFIG_FILE \"${rel_sysconfdir}/mime.types\"" >>confdefs.h
+@@ -42456,7 +42456,6 @@ cat >>confdefs.h <<_ACEOF
+ _ACEOF
  
  
 -perlbin=`$ac_aux_dir/PrintPath perl`



Home | Main Index | Thread Index | Old Index