-*- coding: utf-8 -*-
Changes with Apache 2.0.65
+ *) SECURITY: CVE-2011-3607 (cve.mitre.org)
+ core: Fix integer overflow in ap_pregsub. This can be triggered e.g.
+ with mod_setenvif via a malicious .htaccess. [Stefan Fritsch]
+
*) SECURITY: CVE-2011-3368 (cve.mitre.org)
Reject requests where the request-URI does not match the HTTP
specification, preventing unexpected expansion of target URLs in
I checked proxy_http and could not find a code path to fix.
More eyes welcome.
- *) SECURITY: CVE-2011-3607 (cve.mitre.org)
- Fix integer overflow in ap_pregsub() which, when the mod_setenvif module
- is enabled, could allow local users to gain privileges via a .htaccess
- file. [Stefan Fritsch, Greg Ames]
- From 2.2.x; http://svn.apache.org/viewvc?view=revision&revision=1227280
- +1: gregames, wrowe, trawick
-
*) SECURITY: CVE-2011-4317 (cve.mitre.org)
Resolve additional cases of URL rewriting with ProxyPassMatch or
RewriteRule, where particular request-URIs could result in undesired
len++;
}
else if (no < nmatch && pmatch[no].rm_so < pmatch[no].rm_eo) {
+ if (APR_SIZE_MAX - len <= pmatch[no].rm_eo - pmatch[no].rm_so)
+ return APR_ENOMEM;
len += pmatch[no].rm_eo - pmatch[no].rm_so;
}