Commit Graph

68 Commits

Author SHA1 Message Date
Matthias Fischer
86f22bc9ba apache: Update to 2.4.54
Huge changelog, for details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.54

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-06-09 19:55:07 +00:00
Peter Müller
9a7e4d8506 Switch checksums from MD5 to BLAKE2
Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.

While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.

Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.

In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/.

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremeripfire.org>
2022-04-02 14:19:25 +00:00
Matthias Fischer
bfb19ad740 apache: Update to 2.4.53
For details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.53

Short summary of the most important SECURITY changes:

"Changes with Apache 2.4.53

  *) SECURITY: CVE-2022-23943: mod_sed: Read/write beyond bounds
     (cve.mitre.org)
     Out-of-bounds Write vulnerability in mod_sed of Apache HTTP
     Server allows an attacker to overwrite heap memory with possibly
     attacker provided data.
     This issue affects Apache HTTP Server 2.4 version 2.4.52 and
     prior versions.
     Credits: Ronald Crane (Zippenhop LLC)

  *) SECURITY: CVE-2022-22721: core: Possible buffer overflow with
     very large or unlimited LimitXMLRequestBody (cve.mitre.org)
     If LimitXMLRequestBody is set to allow request bodies larger
     than 350MB (defaults to 1M) on 32 bit systems an integer
     overflow happens which later causes out of bounds writes.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Anonymous working with Trend Micro Zero Day Initiative

  *) SECURITY: CVE-2022-22720: HTTP request smuggling vulnerability
     in Apache HTTP Server 2.4.52 and earlier (cve.mitre.org)
     Apache HTTP Server 2.4.52 and earlier fails to close inbound
     connection when errors are encountered discarding the request
     body, exposing the server to HTTP Request Smuggling
     Credits: James Kettle <james.kettle portswigger.net>

  *) SECURITY: CVE-2022-22719: mod_lua Use of uninitialized value of
     in r:parsebody (cve.mitre.org)
     A carefully crafted request body can cause a read to a random
     memory area which could cause the process to crash.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Chamal De Silva
     ..."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-17 16:43:30 +00:00
Matthias Fischer
d67eff1002 apache: Update to 2.4.52
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>

For details see:
https://dlcdn.apache.org//httpd/CHANGES_2.4.52

Excerpt from changelog:

""Changes with Apache 2.4.52

  *) SECURITY: CVE-2021-44790: Possible buffer overflow when parsing
     multipart content in mod_lua of Apache HTTP Server 2.4.51 and
     earlier (cve.mitre.org)
     A carefully crafted request body can cause a buffer overflow in
     the mod_lua multipart parser (r:parsebody() called from Lua
     scripts).
     The Apache httpd team is not aware of an exploit for the
     vulnerabilty though it might be possible to craft one.
     This issue affects Apache HTTP Server 2.4.51 and earlier.
     Credits: Chamal

  *) SECURITY: CVE-2021-44224: Possible NULL dereference or SSRF in
     forward proxy configurations in Apache HTTP Server 2.4.51 and
     earlier (cve.mitre.org)
     A crafted URI sent to httpd configured as a forward proxy
     (ProxyRequests on) can cause a crash (NULL pointer dereference)
     or, for configurations mixing forward and reverse proxy
     declarations, can allow for requests to be directed to a
     declared Unix Domain Socket endpoint (Server Side Request
     Forgery).
     This issue affects Apache HTTP Server 2.4.7 up to 2.4.51
     (included).
     Credits: 漂亮é¼
     TengMA(@Te3t123)
..."
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2021-12-28 23:01:48 +01:00
Matthias Fischer
b6ef9f4b3e apache: Update to 2.4.51
For details see (2.49):
https://dlcdn.apache.org//httpd/CHANGES_2.4.49

For 2.51:
https://dlcdn.apache.org//httpd/CHANGES_2.4.51

"SECURITY: CVE-2021-42013: Path Traversal and Remote Code
Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete
fix of CVE-2021-41773) (cve.mitre.org)
It was found that the fix for CVE-2021-41773 in Apache HTTP
Server 2.4.50 was insufficient..."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-10-13 12:00:55 +00:00
Matthias Fischer
0957a949db apache: Update to 2.4.48
apache: Update to 2.4.48

For details see:
https://mirror.synyx.de/apache//httpd/CHANGES_2.4.48

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-07 11:15:01 +00:00
Matthias Fischer
2fa9dfa8d9 apache: Update to 2.4.46
For details see:
https://mirrors.ae-online.de/apache//httpd/CHANGES_2.4.46

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-08-17 10:09:20 +00:00
Matthias Fischer
fb241a29c5 apache: Update to 2.4.43
For details see:
http://mirror.dkd.de/apache//httpd/CHANGES_2.4.43

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-04-20 15:19:25 +00:00
Michael Tremer
2dc2a27803 lfs: Drop quotes in DEPS variable
Not sure why this has ever been there. This simply makes it
nicer to read and edit because we can have line-breaks now.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-03-24 08:57:27 +00:00
Matthias Fischer
e83393146f apache: Update to 2.4.41
For details see:
http://mirror.dkd.de/apache//httpd/CHANGES_2.4.41

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-08-20 17:36:48 +00:00
Matthias Fischer
5f2e713ec8 apache: Update to 2.4.39
For details see:
http://mirror.checkdomain.de/apache//httpd/CHANGES_2.4.39

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-04 02:03:22 +01:00
Wolfgang Apolinarski
33f7d610fb Updated apr, stabilized apache build
- Updated apr to 1.6.5
- Stabilized apache build (rebuild)

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-03 21:41:33 +00:00
Matthias Fischer
57bc05a53d apache: Update to 2.4.38
For details see:
http://mirror.checkdomain.de/apache//httpd/CHANGES_2.4.38

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-02-01 17:09:49 +00:00
Matthias Fischer
028eafe79f Apache: Update to 2.4.35
For details see:

http://apache.mirror.digionline.de//httpd/CHANGES_2.4.35

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-10-18 14:30:39 +01:00
Peter Müller
eee037b890 update disclaimer in LFS files
Most of these files still used old dates and/or domain names for contact
mail addresses. This is now replaced by an up-to-date copyright line.

Just some housekeeping... :-)

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-09-10 19:20:36 +01:00
Wolfgang Apolinarski
64add19dfe Apache: Update to 2.4.34
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-07-26 14:38:54 +01:00
Michael Tremer
6723afef09 apache: Write hostname into configuration at boot time
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-06-25 10:59:49 +01:00
Wolfgang Apolinarski
ff2b65c193 Updated Apache 2.4
- Updated Apache from 2.4.29 to 2.4.33
- Updated Apr from 1.6.1 to 1.6.3
- Updated Apr-Util from 1.6.0 to 1.6.1

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-04-11 20:03:53 +01:00
Wolfgang Apolinarski
bf24eeec20 Update to Apache 2.4.29
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-10-28 13:35:43 +01:00
Matthias Fischer
e3fc1d0a2b apache: Update to 2.4.28
http://apache.mirror.digionline.de//httpd/CHANGES_2.4.28

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-10-09 14:46:00 +01:00
Michael Tremer
027614d2dc Merge branch 'captive-portal' into next 2017-10-04 16:10:07 +01:00
Michael Tremer
22ce4c3ad6 apache2: Create captive portal logging directory
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-09-22 19:00:04 +01:00
Michael Tremer
a79b220c5a captive: Log into default apache log files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-09-22 18:54:45 +01:00
Alexander Marx
83ba0896f6 Captive-portal: Add directory for logo upload
Signed-off-by: Alexander Marx <alexander.marx@ipfire.org>
2017-09-22 18:54:45 +01:00
Alexander Marx
1fc9a43056 Captive-Portal: create dir for cative logfiles
Signed-off-by: Alexander Marx <alexander.marx@ipfire.org>
2017-09-22 18:54:03 +01:00
Matthias Fischer
b76d0433be apache2: Import patch for CVE-2017-9798 ("optionsbleed")
Imported from:
https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch

For details see:
https://nvd.nist.gov/vuln/detail/CVE-2017-9798

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-09-20 22:01:50 +01:00
Michael Tremer
b9863c8845 apache2: Import patch for PR61382
We usually do not download patches, but rather ship them with
our source.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-09-07 12:27:43 +01:00
Michael Tremer
051884986d apache2: Download source from IPFire servers
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-09-04 12:56:42 +01:00
Wolfgang Apolinarski
d41fe99f74 Update to apache 2.4.27
- Updated to apache 2.4
- Updated the htpasswd generation to use the more secure bcrypt algorithm

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-09-04 12:40:20 +01:00
Wolfgang Apolinarski
c8e9a7a85e apr and aprutil: Added as requirement for apache 2.4
- APR 1.6.2 is a requirement for building apache httpd 2.4
- APR-Util 1.6.0 is a requirement for building apache httpd 2.4

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-09-04 12:37:56 +01:00
Michael Tremer
afdf148388 Split web-user-interface from apache2 LFS file
It is completely unnecssary to have this in one file
and using options for the LFS is more of a hack than
a solution.
2015-05-05 14:00:20 +02:00
Arne Fitzenreiter
7f5795c65f apache2: Update to version 2.2.29 2015-03-19 19:18:23 +01:00
Arne Fitzenreiter
fee04791f4 apache2: update to 2.2.27. 2014-04-04 21:17:08 +02:00
Arne Fitzenreiter
cbc492f516 apache2: update to 2.2.26. 2014-03-02 19:44:26 +01:00
Michael Tremer
1fbb415ada apache2: Fix directory permissions of themes. 2014-01-06 21:53:58 +01:00
Michael Tremer
935f311ed9 Add an alternative default theme with rounded corners. 2014-01-05 21:07:41 +01:00
Michael Tremer
6e77821da8 Fix permissions of redirect-template directories. 2013-10-12 20:51:08 +02:00
Arne Fitzenreiter
102d54873b apache: update to 2.2.23.
Fixed in Apache httpd 2.2.23

low: XSS in mod_negotiation when untrusted uploads are supported CVE-2012-2687
    Note: This issue is also known as CVE-2008-0455.

low: insecure LD_LIBRARY_PATH handling CVE-2012-0883

http://httpd.apache.org/security/vulnerabilities_22.html
2012-09-30 22:34:41 +02:00
Arne Fitzenreiter
261f88ebe6 apache: fix typo. 2012-02-08 19:59:36 +01:00
Arne Fitzenreiter
7e4506e9c7 apache: security update to 2.2.22.
Fix six low and moderate security flaws. Most of them are not important for ipfire.
low: mod_setenvif .htaccess privilege escalation CVE-2011-3607
low: mod_log_config crash CVE-2012-0021
low: scoreboard parent DoS CVE-2012-0031
moderate: mod_proxy reverse proxy exposure CVE-2011-4317
moderate: error responses can expose cookies CVE-2012-0053
moderate: mod_proxy reverse proxy exposure CVE-2011-3368

For details check: http://httpd.apache.org/security/vulnerabilities_22.html
2012-02-08 07:43:48 +01:00
Arne Fitzenreiter
736d1ed96e apache2: update to 2.2.21. 2011-09-16 19:46:03 +02:00
Arne Fitzenreiter
ec372b7b51 apache2: update to 2.2.20. 2011-08-31 14:42:06 +02:00
Arne Fitzenreiter
ca23dbe2fa apache2: update to 2.2.19. 2011-06-12 00:00:05 +02:00
Arne Fitzenreiter
222afbd54a Updated apache2 (2.2.17). 2010-11-18 08:36:54 +01:00
Arne Fitzenreiter
f36498f328 Updated apache (2.2.15). 2010-03-12 17:19:15 +01:00
maniacikarus
574d71d988 Enabled proxy modules for apache 2009-01-19 22:31:35 +01:00
Maniacikarus
dec007d7da Upgraded ap 2008-12-23 12:10:42 +01:00
Maniacikarus
027306bfe5 Some Final Upgrade before RC just to have latests bugfixes 2008-10-19 16:52:47 +02:00
Michael Tremer
8fc2cdd6b0 Removed deletion of the old .svn-subdirectories. 2008-04-09 23:29:30 +02:00
arne_f
e17aebd7cc Fixed html/graphs creation
git-svn-id: http://svn.ipfire.org/svn/ipfire/branches/2.1/trunk@1181 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2008-02-03 02:14:20 +00:00