add security fix for CVE-2016-5387
This commit is contained in:
parent
17ef1b1f5e
commit
4a0435cd7b
16
httpd-2.4.18-CVE-2016-5387.patch
Normal file
16
httpd-2.4.18-CVE-2016-5387.patch
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
|
||||||
|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-5387
|
||||||
|
|
||||||
|
--- httpd-2.4.18/server/util_script.c.cve5387
|
||||||
|
+++ httpd-2.4.18/server/util_script.c
|
||||||
|
@@ -195,6 +195,10 @@
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
+ else if (!strcasecmp(hdrs[i].key, "Proxy")) {
|
||||||
|
+ /* Don't pass through HTTP_PROXY */
|
||||||
|
+ continue;
|
||||||
|
+ }
|
||||||
|
else
|
||||||
|
add_unless_null(e, http2env(r, hdrs[i].key), hdrs[i].val);
|
||||||
|
}
|
@ -8,7 +8,7 @@
|
|||||||
Summary: Apache HTTP Server
|
Summary: Apache HTTP Server
|
||||||
Name: httpd
|
Name: httpd
|
||||||
Version: 2.4.23
|
Version: 2.4.23
|
||||||
Release: 3%{?dist}
|
Release: 4%{?dist}
|
||||||
URL: http://httpd.apache.org/
|
URL: http://httpd.apache.org/
|
||||||
Source0: http://www.apache.org/dist/httpd/httpd-%{version}.tar.bz2
|
Source0: http://www.apache.org/dist/httpd/httpd-%{version}.tar.bz2
|
||||||
Source1: index.html
|
Source1: index.html
|
||||||
@ -67,6 +67,7 @@ Patch55: httpd-2.4.4-malformed-host.patch
|
|||||||
Patch56: httpd-2.4.4-mod_unique_id.patch
|
Patch56: httpd-2.4.4-mod_unique_id.patch
|
||||||
Patch57: httpd-2.4.10-sigint.patch
|
Patch57: httpd-2.4.10-sigint.patch
|
||||||
# Security fixes
|
# Security fixes
|
||||||
|
Patch100: httpd-2.4.18-CVE-2016-5387.patch
|
||||||
License: ASL 2.0
|
License: ASL 2.0
|
||||||
Group: System Environment/Daemons
|
Group: System Environment/Daemons
|
||||||
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root
|
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root
|
||||||
@ -211,6 +212,8 @@ interface for storing and accessing per-user session data.
|
|||||||
%patch56 -p1 -b .uniqueid
|
%patch56 -p1 -b .uniqueid
|
||||||
%patch57 -p1 -b .sigint
|
%patch57 -p1 -b .sigint
|
||||||
|
|
||||||
|
%patch100 -p1 -b .cve5387
|
||||||
|
|
||||||
# Patch in the vendor string
|
# Patch in the vendor string
|
||||||
sed -i '/^#define PLATFORM/s/Unix/%{vstring}/' os/unix/os.h
|
sed -i '/^#define PLATFORM/s/Unix/%{vstring}/' os/unix/os.h
|
||||||
|
|
||||||
@ -682,6 +685,9 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
%{_rpmconfigdir}/macros.d/macros.httpd
|
%{_rpmconfigdir}/macros.d/macros.httpd
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jul 18 2016 Joe Orton <jorton@redhat.com> - 2.4.23-4
|
||||||
|
- add security fix for CVE-2016-5387
|
||||||
|
|
||||||
* Thu Jul 7 2016 Joe Orton <jorton@redhat.com> - 2.4.23-3
|
* Thu Jul 7 2016 Joe Orton <jorton@redhat.com> - 2.4.23-3
|
||||||
- load mod_watchdog by default (#1353582)
|
- load mod_watchdog by default (#1353582)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user