Preventive backport, 2.2.x not concerned by CVE-2015-0253.
r1664205 | covener | 2015-03-05 03:33:16 +0100 (Thu, 05 Mar 2015) | 12 lines
*) SECURITY: CVE-2015-0253 (cve.mitre.org)
core: Fix a crash introduced in with ErrorDocument 400 pointing
to a local URL-path with the INCLUDES filter active, introduced
in 2.4.11. PR 57531. [Yann Ylavic]
Submitted By: ylavic
Committed By: covener
Reviewed by: ylavic, wrowe, rjung
Backported by: ylavic
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x@
1680927 13f79535-47bb-0310-9956-
ffa450edef68
-*- coding: utf-8 -*-
Changes with Apache 2.2.30
+ *) core: Avoid potential use of uninitialized (NULL) request data in
+ request line error path. [Yann Ylavic]
+
*) mod_proxy_http: Use the "Connection: close" header for requests to
backends not recycling connections (disablereuse), including the default
reverse and forward proxies. [Yann Ylavic]
2.2.x patch: http://people.apache.org/~wrowe/httpd-2.2-default-httpd-ssl.conf.in.patch
+1: wrowe, ylavic, rjung
- * core: Avoid potential use of uninitialized (NULL) request data in
- request line error path.
- trunk patch: http://svn.apache.org/r1664205
- 2.2.x patch: http://people.apache.org/~ylavic/httpd-2.2.x-read_request_line.patch
- (trunk works but CHANGES entry does not need to refer to CVE-2015-0253)
- +1: ylavic, wrowe, rjung
- ylavic: this is CVE-2015-0253 wrt 2.4.13, although 2.2.x is not
- vulnerable per se (no ErrorDocument handling from early
- request line parser), better be safe than sorry.
-
PATCHES PROPOSED TO BACKPORT FROM TRUNK:
[ New proposals should be added at the end of the list ]
*/
if (rv == APR_ENOSPC) {
r->status = HTTP_REQUEST_URI_TOO_LARGE;
- r->proto_num = HTTP_VERSION(1,0);
- r->protocol = apr_pstrdup(r->pool, "HTTP/1.0");
}
else if (APR_STATUS_IS_TIMEUP(rv)) {
r->status = HTTP_REQUEST_TIME_OUT;
}
+ r->proto_num = HTTP_VERSION(1,0);
+ r->protocol = apr_pstrdup(r->pool, "HTTP/1.0");
return 0;
}
} while ((len <= 0) && (++num_blank_lines < max_blank_lines));