22c31d8d94
The main security vulnerabilities addressed in 1.3.33 are: * CAN-2004-0940 (cve.mitre.org) Fix potential buffer overflow with escaped characters in SSI tag string. * CAN-2004-0492 (cve.mitre.org) Reject responses from a remote server if sent an invalid (negative) Content-Length. New features * Win32: Improve error reporting after a failed attempt to spawn a piped log process or rewrite map process. * Added new compile-time flag: UCN_OFF_HONOR_PHYSICAL_PORT. It controls how UseCanonicalName Off determines the port value if the client doesn't provide one in the Host header. If defined during compilation, UseCanonicalName Off will use the physical port number to generate the canonical name. If not defined, it tries the current Port value followed by the default port for the current scheme. The following bugs were found in Apache 1.3.31 (or earlier) and have been fixed in Apache 1.3.33: * mod_rewrite: Fix query string handling for proxied URLs. PR 14518. * mod_rewrite: Fix 0 bytes write into random memory position. PR 31036. * mod_digest: Fix nonce string calculation since 1.3.31 which would force re-authentication for every connection if AuthDigestRealmSeed was not configured. PR 30920. * Fix trivial bug in mod_log_forensic that caused the child to seg fault when certain invalid requests were fired at it with forensic logging is enabled. PR 29313. * No longer breaks mod_dav, frontpage and others. Repair a patch in 1.3.31 which prevented discarding the request body for requests that will be keptalive but are not currently keptalive. PR 29237.
21 lines
693 B
Text
21 lines
693 B
Text
$NetBSD: patch-af,v 1.10 2004/10/29 13:48:31 abs Exp $
|
|
|
|
--- src/modules/standard/mod_so.c.orig 2004-10-29 14:44:35.000000000 +0100
|
|
+++ src/modules/standard/mod_so.c
|
|
@@ -321,7 +321,15 @@ static const char *load_file(cmd_parms *
|
|
return err;
|
|
}
|
|
|
|
- file = ap_server_root_relative(cmd->pool, filename);
|
|
+ /*
|
|
+ * If the filename starts with '!', then just dlopen() it without
|
|
+ * translating it to a pathname relative to ServerRoot.
|
|
+ */
|
|
+ if (filename[0] == '!') {
|
|
+ file = filename + 1;
|
|
+ } else {
|
|
+ file = ap_server_root_relative(cmd->pool, filename);
|
|
+ }
|
|
|
|
if (!(handle = ap_os_dso_load(file))) {
|
|
const char *my_error = ap_os_dso_error();
|