head 1.10;
access;
symbols
pkgsrc-2014Q1:1.9.0.38
pkgsrc-2014Q1-base:1.9
pkgsrc-2013Q4:1.9.0.36
pkgsrc-2013Q4-base:1.9
pkgsrc-2013Q3:1.9.0.34
pkgsrc-2013Q3-base:1.9
pkgsrc-2013Q2:1.9.0.32
pkgsrc-2013Q2-base:1.9
pkgsrc-2013Q1:1.9.0.30
pkgsrc-2013Q1-base:1.9
pkgsrc-2012Q4:1.9.0.28
pkgsrc-2012Q4-base:1.9
pkgsrc-2012Q3:1.9.0.26
pkgsrc-2012Q3-base:1.9
pkgsrc-2012Q2:1.9.0.24
pkgsrc-2012Q2-base:1.9
pkgsrc-2012Q1:1.9.0.22
pkgsrc-2012Q1-base:1.9
pkgsrc-2011Q4:1.9.0.20
pkgsrc-2011Q4-base:1.9
pkgsrc-2011Q3:1.9.0.18
pkgsrc-2011Q3-base:1.9
pkgsrc-2011Q2:1.9.0.16
pkgsrc-2011Q2-base:1.9
pkgsrc-2011Q1:1.9.0.14
pkgsrc-2011Q1-base:1.9
pkgsrc-2010Q4:1.9.0.12
pkgsrc-2010Q4-base:1.9
pkgsrc-2010Q3:1.9.0.10
pkgsrc-2010Q3-base:1.9
pkgsrc-2010Q2:1.9.0.8
pkgsrc-2010Q2-base:1.9
pkgsrc-2010Q1:1.9.0.6
pkgsrc-2010Q1-base:1.9
pkgsrc-2009Q4:1.9.0.4
pkgsrc-2009Q4-base:1.9
pkgsrc-2009Q3:1.9.0.2
pkgsrc-2009Q3-base:1.9
pkgsrc-2008Q4:1.8.0.10
pkgsrc-2008Q4-base:1.8
pkgsrc-2008Q3:1.8.0.8
pkgsrc-2008Q3-base:1.8
cube-native-xorg:1.8.0.6
cube-native-xorg-base:1.8
pkgsrc-2008Q2:1.8.0.4
pkgsrc-2008Q2-base:1.8
pkgsrc-2008Q1:1.8.0.2
pkgsrc-2008Q1-base:1.8
pkgsrc-2007Q4:1.7.0.6
pkgsrc-2007Q4-base:1.7
pkgsrc-2007Q3:1.7.0.4
pkgsrc-2007Q3-base:1.7
pkgsrc-2007Q2:1.7.0.2
pkgsrc-2007Q2-base:1.7
pkgsrc-2007Q1:1.4.0.24
pkgsrc-2007Q1-base:1.4
pkgsrc-2006Q4:1.4.0.22
pkgsrc-2006Q4-base:1.4
pkgsrc-2006Q3:1.4.0.20
pkgsrc-2006Q3-base:1.4
pkgsrc-2006Q2:1.4.0.18
pkgsrc-2006Q2-base:1.4
pkgsrc-2006Q1:1.4.0.16
pkgsrc-2006Q1-base:1.4
pkgsrc-2005Q4:1.4.0.14
pkgsrc-2005Q4-base:1.4
pkgsrc-2005Q3:1.4.0.12
pkgsrc-2005Q3-base:1.4
pkgsrc-2005Q2:1.4.0.10
pkgsrc-2005Q2-base:1.4
pkgsrc-2005Q1:1.4.0.8
pkgsrc-2005Q1-base:1.4
pkgsrc-2004Q4:1.4.0.6
pkgsrc-2004Q4-base:1.4
pkgsrc-2004Q3:1.4.0.4
pkgsrc-2004Q3-base:1.4
pkgsrc-2004Q2:1.4.0.2
pkgsrc-2004Q2-base:1.4
pkgsrc-2004Q1:1.2.0.4
pkgsrc-2004Q1-base:1.2
pkgsrc-2003Q4:1.2.0.2
pkgsrc-2003Q4-base:1.2;
locks; strict;
comment @# @;
1.10
date 2014.06.10.15.22.18; author joerg; state dead;
branches;
next 1.9;
commitid djgMkPoOrhNxnZDx;
1.9
date 2009.07.25.19.55.11; author roy; state Exp;
branches;
next 1.8;
1.8
date 2008.02.23.05.16.34; author obache; state dead;
branches;
next 1.7;
1.7
date 2007.06.28.01.24.39; author lkundrak; state Exp;
branches;
next 1.6;
1.6
date 2007.06.28.00.43.36; author lkundrak; state Exp;
branches;
next 1.5;
1.5
date 2007.06.28.00.38.01; author lkundrak; state Exp;
branches;
next 1.4;
1.4
date 2004.05.13.11.39.10; author taca; state dead;
branches;
next 1.3;
1.3
date 2004.04.26.20.06.58; author jlam; state Exp;
branches;
next 1.2;
1.2
date 2003.11.02.05.36.56; author grant; state dead;
branches;
next 1.1;
1.1
date 2003.10.29.10.44.28; author cube; state Exp;
branches;
next ;
desc
@@
1.10
log
@Retire Apache 1.3 and 2.0.
@
text
@$NetBSD: patch-as,v 1.9 2009/07/25 19:55:11 roy Exp $
Avoid collision with system getline(3).
--- src/support/htpasswd.c.orig 2009-07-25 20:50:15.000000000 +0100
+++ src/support/htpasswd.c 2009-07-25 20:50:27.000000000 +0100
@@@@ -98,7 +98,7 @@@@
* Get a line of input from the user, not including any terminating
* newline.
*/
-static int getline(char *s, int n, FILE *f)
+static int get_line(char *s, int n, FILE *f)
{
register int i = 0;
@@@@ -547,7 +547,7 @@@@
char scratch[MAX_STRING_LEN];
fpw = fopen(pwfilename, "r");
- while (! (getline(line, sizeof(line), fpw))) {
+ while (! (get_line(line, sizeof(line), fpw))) {
char *colon;
if ((line[0] == '#') || (line[0] == '\0')) {
@
1.9
log
@Avoid collision with system getline(3).
@
text
@d1 1
a1 1
$NetBSD$
@
1.8
log
@Update apache to 1.3.41.
Changes with Apache 1.3.41
*) SECURITY: CVE-2007-6388 (cve.mitre.org)
mod_status: Ensure refresh parameter is numeric to prevent
a possible XSS attack caused by redirecting to other URLs.
Reported by SecurityReason. [Mark Cox]
Changes with Apache 1.3.40 (not released)
*) SECURITY: CVE-2007-5000 (cve.mitre.org)
mod_imap: Fix cross-site scripting issue. Reported by JPCERT.
[Joe Orton]
*) SECURITY: CVE-2007-3847 (cve.mitre.org)
mod_proxy: Prevent reading past the end of a buffer when parsing
date-related headers. PR 41144.
With Apache 1.3, the denial of service vulnerability applies only
to the Windows and NetWare platforms.
[Jeff Trawick]
*) More efficient implementation of the CVE-2007-3304 PID table
patch. This fixes issues with excessive memory usage by the
parent process if long-running and with a high number of child
process forks during that timeframe. Also fixes bogus "Bad pid"
errors. [Jim Jagielski, Jeff Trawick]
Changes with Apache 1.3.39
*) SECURITY: CVE-2006-5752 (cve.mitre.org)
mod_status: Fix a possible XSS attack against a site with a public
server-status page and ExtendedStatus enabled, for browsers which
perform charset "detection". Reported by Stefan Esser. [Joe Orton]
*) SECURITY: CVE-2007-3304 (cve.mitre.org)
Ensure that the parent process cannot be forced to kill non-child
processes by checking scoreboard PID data with parent process
privately stored PID data. [Jim Jagielski]
*) mime.types: Many updates to sync with IANA registry and common
unregistered types that the owners refuse to register. Admins
are encouraged to update their installed mime.types file.
pr: 35550, 37798, 39317, 31483 [Roy T. Fielding]
There was no Apache 1.3.38
@
text
@d1 1
a1 1
$NetBSD: patch-as,v 1.7 2007/06/28 01:24:39 lkundrak Exp $
d3 1
a3 1
Fix for CVE-2006-5752 XSS in mod_status with ExtendedStatus on.
d5 10
a14 5
--- src/modules/standard/mod_status.c.orig 2007-06-28 02:39:31.000000000 +0200
+++ src/modules/standard/mod_status.c 2007-06-28 02:44:25.000000000 +0200
@@@@ -221,7 +221,7 @@@@ static int status_handler(request_rec *r
if (r->method_number != M_GET)
return DECLINED;
d16 2
a17 2
- r->content_type = "text/html";
+ r->content_type = "text/html; charset=ISO-8859-1";
d19 6
a24 37
/*
* Simple table-driven form data set parser that lets you alter the header
@@@@ -247,7 +247,7 @@@@ static int status_handler(request_rec *r
no_table_report = 1;
break;
case STAT_OPT_AUTO:
- r->content_type = "text/plain";
+ r->content_type = "text/plain; charset=ISO-8859-1";
short_report = 1;
break;
}
@@@@ -591,7 +591,7 @@@@ static int status_handler(request_rec *r
ap_rputs(")\n", r);
ap_rprintf(r, " %s {%s} [%s]
\n\n",
ap_escape_html(r->pool, score_record.client),
- ap_escape_html(r->pool, score_record.request),
+ ap_escape_html(r->pool, ap_escape_logitem(r->pool, score_record.request)),
vhost ? ap_escape_html(r->pool,
vhost->server_hostname) : "(unavailable)");
}
@@@@ -686,14 +686,14 @@@@ static int status_handler(request_rec *r
"\n\n",
score_record.client,
vhost ? vhost->server_hostname : "(unavailable)",
- ap_escape_html(r->pool, score_record.request));
+ ap_escape_html(r->pool, ap_escape_logitem(r->pool, score_record.request)));
#else
ap_rprintf(r,
"