Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package apache2 for openSUSE:Factory checked 
in at 2025-07-20 15:28:01
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/apache2 (Old)
 and      /work/SRC/openSUSE:Factory/.apache2.new.8875 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "apache2"

Sun Jul 20 15:28:01 2025 rev:217 rq:1294249 version:2.4.64

Changes:
--------
--- /work/SRC/openSUSE:Factory/apache2/apache2.changes  2025-03-11 
20:43:49.358447878 +0100
+++ /work/SRC/openSUSE:Factory/.apache2.new.8875/apache2.changes        
2025-07-20 15:28:12.741935022 +0200
@@ -1,0 +2,73 @@
+Fri Jul 18 03:25:25 UTC 2025 - Martin Schreiner <martin.schrei...@suse.com>
+
+* Refresh patches:
+  - apache-test-application-xml-type.patch
+  - apache-test-turn-off-variables-in-ssl-var-lookup.patch
+  - apache2-HttpContentLengthHeadZero-HttpExpectStrict.patch
+  - apache2-LimitRequestFieldSize-limits-headers.patch
+* Update to 2.4.64.
+* CVE-2025-53020: Apache HTTP Server: HTTP/2 DoS by Memory Increase
+* CVE-2025-49812: Apache HTTP Server: mod_ssl TLS upgrade attack
+* CVE-2025-49630: Apache HTTP Server: mod_proxy_http2 denial of service
+* CVE-2025-23048: Apache HTTP Server: mod_ssl access control bypass with 
session resumption
+* CVE-2024-47252: Apache HTTP Server: mod_ssl error log variable escaping
+* CVE-2024-43394: Apache HTTP Server: SSRF on Windows due to UNC paths
+* CVE-2024-43204: Apache HTTP Server: SSRF with mod_headers setting 
Content-Type header
+* CVE-2024-42516: Apache HTTP Server: HTTP response splitting
+* mod_proxy_ajp: Use iobuffersize set on worker level for the IO buffer
+  size.
+* mod_ssl: Drop $SSLKEYLOGFILE handling internally for OpenSSL 3.5
+  builds which enable it in libssl natively.
+* mod_asis: Fix the log level of the message AH01236.
+* mod_session_dbd: ensure format used with SessionDBDCookieName and
+  SessionDBDCookieName2 are correct.
+* mod_headers: 'RequestHeader set|edit|edit_r Content-Type X' could
+  inadvertently modify the Content-Type _response_ header. Applies to
+  Content-Type only and likely to only affect static file responses.
+* mod_ssl: Remove warning over potential uninitialised value
+  for ssl protocol prior to protocol selection.
+* mod_proxy: Reuse ProxyRemote connections when possible, like prior
+  to 2.4.59.
+* mod_systemd: Add systemd socket activation support.
+* mod_systemd: Log the SELinux context at startup if available and
+  enabled.
+* mod_http2: update to version 2.0.32
+  The code setting the connection window size was set wrong,
+  preventing `H2WindowSize` to work.
+* mod_http2: update to version 2.0.30
+- Fixed bug in handling over long response headers. When the 64 KB limit
+  of nghttp2 was exceeded, the request was not reset and the client was
+  left hanging, waiting for it. Now the stream is reset.
+- Added new directive `H2MaxHeaderBlockLen` to set the limit on response
+  header sizes.
+- Fixed handling of Timeout vs. KeepAliveTimeout when first request on a
+  connection was reset.
+* mod_lua: Fix memory handling in LuaOutputFilter.
+* mod_proxy_http2: revert r1912193 for detecting broken backend connections
+  as this interferes with backend selection who a node is unresponsive.
+* mod_proxy_balancer: Fix a regression that caused stickysession keys no
+  longer be recognized if they are provided as query parameter in the URL.
+* mod_md: update to version 2.5.2
+- Fixed TLS-ALPN-01 challenges when multiple `MDPrivateKeys` are specified
+  with EC keys before RSA ones.
+- Fixed missing newlines in the status page output.
+* mod_dav: Add API to expose DavBasePath setting.
+* mod_md: update to version 2.5.1
+  - Added support for ACME profiles with new directives MDProfile and
+    MDProfileMandatory.
+  - When installing a custom CA file via `MDCACertificateFile`, also set the
+    libcurl option CURLSSLOPT_NO_REVOKE that suppresses complains by Schannel
+    (when curl is linked with it) about missing CRL/OCSP in certificates.
+  - Fixed handling of corrupted httpd.json and added test 300_30 for it.
+    File is removed on error and written again. Fixes #369.
+  - Added explanation in log for how to proceed when md_store.json could not be
+    parsed and prevented the server start.
+  - restored fixed to #336 and #337 which got lost in a sync with Apache svn
+  - Add Issue Name/Uris to certificate information in md-status handler
+  - MDomains with static certificate files have MDRenewMode "manual", unless
+    "always" is configured.
+* core: Report invalid Options= argument when parsing AllowOverride
+  directives.
+* scoreboard/mod_http2: record durations of HTTP/2 requests.
+
+-------------------------------------------------------------------

Old:
----
  httpd-2.4.63.tar.bz2
  httpd-2.4.63.tar.bz2.asc

New:
----
  httpd-2.4.64.tar.bz2
  httpd-2.4.64.tar.bz2.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ apache2.spec ++++++
--- /var/tmp/diff_new_pack.oavcdu/_old  2025-07-20 15:28:18.470172063 +0200
+++ /var/tmp/diff_new_pack.oavcdu/_new  2025-07-20 15:28:18.486172725 +0200
@@ -107,7 +107,7 @@
 %define build_http2 1
 
 Name:           apache2%{psuffix}
-Version:        2.4.63
+Version:        2.4.64
 Release:        0
 Summary:        The Apache HTTPD Server
 License:        Apache-2.0

++++++ apache-test-application-xml-type.patch ++++++
--- /var/tmp/diff_new_pack.oavcdu/_old  2025-07-20 15:28:18.654179677 +0200
+++ /var/tmp/diff_new_pack.oavcdu/_new  2025-07-20 15:28:18.662180008 +0200
@@ -1,8 +1,8 @@
-Index: httpd-framework/t/conf/extra.conf.in
+Index: httpd-2.4.64/httpd-framework/t/conf/extra.conf.in
 ===================================================================
---- a/httpd-framework/t/conf/extra.conf.in     2020-06-15 10:43:26.156701553 
+0200
-+++ b/httpd-framework/t/conf/extra.conf.in     2020-06-15 10:46:16.141693081 
+0200
-@@ -875,6 +875,7 @@ LimitRequestFields    32
+--- httpd-2.4.64.orig/httpd-framework/t/conf/extra.conf.in
++++ httpd-2.4.64/httpd-framework/t/conf/extra.conf.in
+@@ -983,6 +983,7 @@ LimitRequestFields    32
         </IfModule>
     </Directory>
     <Directory @SERVERROOT@/htdocs/modules/filter/bytype>

++++++ apache-test-turn-off-variables-in-ssl-var-lookup.patch ++++++
--- /var/tmp/diff_new_pack.oavcdu/_old  2025-07-20 15:28:18.678180670 +0200
+++ /var/tmp/diff_new_pack.oavcdu/_new  2025-07-20 15:28:18.678180670 +0200
@@ -1,8 +1,8 @@
-Index: httpd-framework/t/ssl/varlookup.t
+Index: httpd-2.4.64/httpd-framework/t/ssl/varlookup.t
 ===================================================================
---- a/httpd-framework/t/ssl/varlookup.t        2016-10-25 14:30:54.250707932 
+0200
-+++ b/httpd-framework/t/ssl/varlookup.t        2016-10-27 15:38:52.440667690 
+0200
-@@ -210,9 +210,7 @@ SSL_SERVER_S_DN_UID
+--- httpd-2.4.64.orig/httpd-framework/t/ssl/varlookup.t
++++ httpd-2.4.64/httpd-framework/t/ssl/varlookup.t
+@@ -227,9 +227,7 @@ SSL_SERVER_S_DN_UID
  SSL_CLIENT_S_DN_Email        "$client_dn{$email_field}"
  SSL_SERVER_S_DN_Email        "$server_dn{$email_field}"
  SSL_CLIENT_SAN_Email_0       "$san_email"

++++++ apache2-HttpContentLengthHeadZero-HttpExpectStrict.patch ++++++
--- /var/tmp/diff_new_pack.oavcdu/_old  2025-07-20 15:28:18.694181333 +0200
+++ /var/tmp/diff_new_pack.oavcdu/_new  2025-07-20 15:28:18.698181498 +0200
@@ -42,11 +42,11 @@
  server/protocol.c           | 25 +++++++++++++++++--------
  6 files changed, 77 insertions(+), 10 deletions(-)
 
-Index: httpd-2.4.49/modules/http/http_filters.c
+Index: httpd-2.4.64/modules/http/http_filters.c
 ===================================================================
---- httpd-2.4.49.orig/modules/http/http_filters.c      2021-05-11 
17:21:43.000000000 +0200
-+++ httpd-2.4.49/modules/http/http_filters.c   2021-09-17 09:33:49.496853894 
+0200
-@@ -1488,10 +1488,17 @@ AP_CORE_DECLARE_NONSTD(apr_status_t) ap_
+--- httpd-2.4.64.orig/modules/http/http_filters.c
++++ httpd-2.4.64/modules/http/http_filters.c
+@@ -1409,10 +1409,17 @@ static void merge_response_headers(reque
       * zero C-L to the client.  We can't just remove the C-L filter,
       * because well behaved 2.0 handlers will send their data down the stack,
       * and we will compute a real C-L for the head request. RBB
@@ -64,12 +64,12 @@
 +        && conf->http_cl_head_zero != AP_HTTP_CL_HEAD_ZERO_ENABLE) {
          apr_table_unset(r->headers_out, "Content-Length");
      }
- 
-Index: httpd-2.4.49/server/core.c
+ }
+Index: httpd-2.4.64/server/core.c
 ===================================================================
---- httpd-2.4.49.orig/server/core.c    2021-05-27 15:08:21.000000000 +0200
-+++ httpd-2.4.49/server/core.c 2021-09-17 09:33:49.496853894 +0200
-@@ -551,6 +551,12 @@ static void *merge_core_server_configs(a
+--- httpd-2.4.64.orig/server/core.c
++++ httpd-2.4.64/server/core.c
+@@ -564,6 +564,12 @@ static void *merge_core_server_configs(a
      if (virt->http_methods != AP_HTTP_METHODS_UNSET)
          conf->http_methods = virt->http_methods;
  
@@ -82,7 +82,7 @@
      /* no action for virt->accf_map, not allowed per-vhost */
  
      if (virt->protocol)
-@@ -4142,6 +4148,32 @@ static const char *set_http_method(cmd_p
+@@ -4166,6 +4172,32 @@ static const char *set_http_method(cmd_p
      return NULL;
  }
  
@@ -115,7 +115,7 @@
  static apr_hash_t *errorlog_hash;
  
  static int log_constant_item(const ap_errorlog_info *info, const char *arg,
-@@ -4685,6 +4717,10 @@ AP_INIT_TAKE1("TraceEnable", set_trace_e
+@@ -4732,6 +4764,10 @@ AP_INIT_TAKE1("TraceEnable", set_trace_e
                "'on' (default), 'off' or 'extended' to trace request body 
content"),
  AP_INIT_FLAG("MergeTrailers", set_merge_trailers, NULL, RSRC_CONF,
                "merge request trailers into request headers or not"),
@@ -126,11 +126,11 @@
  AP_INIT_ITERATE("Protocols", set_protocols, NULL, RSRC_CONF,
                  "Controls which protocols are allowed"),
  AP_INIT_TAKE1("ProtocolsHonorOrder", set_protocols_honor_order, NULL, 
RSRC_CONF,
-Index: httpd-2.4.49/server/protocol.c
+Index: httpd-2.4.64/server/protocol.c
 ===================================================================
---- httpd-2.4.49.orig/server/protocol.c        2021-09-17 09:33:49.496853894 
+0200
-+++ httpd-2.4.49/server/protocol.c     2021-09-17 10:15:28.643596021 +0200
-@@ -1056,6 +1056,11 @@ AP_DECLARE(int) ap_check_request_header(
+--- httpd-2.4.64.orig/server/protocol.c
++++ httpd-2.4.64/server/protocol.c
+@@ -1058,6 +1058,11 @@ AP_DECLARE(int) ap_check_request_header(
          if (ap_cstr_casecmp(expect, "100-continue") == 0) {
              r->expecting_100 = 1;
          }
@@ -142,11 +142,11 @@
          else {
              ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(00570)
                            "client sent an unrecognized expectation value "
-Index: httpd-2.4.49/include/http_core.h
+Index: httpd-2.4.64/include/http_core.h
 ===================================================================
---- httpd-2.4.49.orig/include/http_core.h      2021-05-27 15:08:21.000000000 
+0200
-+++ httpd-2.4.49/include/http_core.h   2021-09-17 09:33:49.496853894 +0200
-@@ -733,6 +733,16 @@ typedef struct {
+--- httpd-2.4.64.orig/include/http_core.h
++++ httpd-2.4.64/include/http_core.h
+@@ -734,6 +734,16 @@ typedef struct {
  #define AP_MERGE_TRAILERS_DISABLE  2
      int merge_trailers;
  
@@ -163,7 +163,7 @@
      apr_array_header_t *protocols;
      int protocols_honor_order;
  
-@@ -776,7 +786,6 @@ apr_status_t ap_core_input_filter(ap_fil
+@@ -780,7 +790,6 @@ apr_status_t ap_core_input_filter(ap_fil
                                    apr_off_t readbytes);
  apr_status_t ap_core_output_filter(ap_filter_t *f, apr_bucket_brigade *b);
  

++++++ apache2-LimitRequestFieldSize-limits-headers.patch ++++++
--- /var/tmp/diff_new_pack.oavcdu/_old  2025-07-20 15:28:18.710181994 +0200
+++ /var/tmp/diff_new_pack.oavcdu/_new  2025-07-20 15:28:18.718182326 +0200
@@ -1,8 +1,8 @@
-Index: httpd-2.4.46/server/util_script.c
+Index: httpd-2.4.64/server/util_script.c
 ===================================================================
---- httpd-2.4.46.orig/server/util_script.c     2020-07-20 07:58:49.000000000 
+0200
-+++ httpd-2.4.46/server/util_script.c  2020-11-10 16:10:54.525476516 +0100
-@@ -468,11 +468,20 @@ AP_DECLARE(int) ap_scan_script_header_er
+--- httpd-2.4.64.orig/server/util_script.c
++++ httpd-2.4.64/server/util_script.c
+@@ -472,11 +472,20 @@ AP_DECLARE(int) ap_scan_script_header_er
      apr_table_t *cookie_table;
      int trace_log = APLOG_R_MODULE_IS_LEVEL(r, module_index, APLOG_TRACE1);
      int first_header = 1;
@@ -24,7 +24,7 @@
  
      /* temporary place to hold headers to merge in later */
      merge = apr_table_make(r->pool, 10);
-@@ -488,7 +497,7 @@ AP_DECLARE(int) ap_scan_script_header_er
+@@ -492,7 +501,7 @@ AP_DECLARE(int) ap_scan_script_header_er
  
      while (1) {
  
@@ -33,7 +33,7 @@
          if (rv == 0) {
              const char *msg = "Premature end of script headers";
              if (first_header)
-@@ -603,10 +612,13 @@ AP_DECLARE(int) ap_scan_script_header_er
+@@ -607,10 +616,13 @@ AP_DECLARE(int) ap_scan_script_header_er
          if (!(l = strchr(w, ':'))) {
              if (!buffer) {
                  /* Soak up all the script output - may save an outright kill 
*/

++++++ httpd-2.4.63.tar.bz2 -> httpd-2.4.64.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/apache2/httpd-2.4.63.tar.bz2 
/work/SRC/openSUSE:Factory/.apache2.new.8875/httpd-2.4.64.tar.bz2 differ: char 
11, line 1

Reply via email to