summaryrefslogtreecommitdiffstats
path: root/usr.sbin/httpd/src (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* SECURITY: CAN-2004-0940 (cve.mitre.org)deraadt2005-01-081-20/+35
| | | | | | mod_include: Fix potential buffer overflow with escaped characters in SSI tag string. [Martin Kraemer, Jim Jagielski] merged by fgsch
* document that suexec has to be setuid to work correctly;jmc2004-12-281-7/+22
| | | | | | slightly more logical layout of the page; ok henning@
* sync w/ obsd;jmc2004-12-213-23/+29
|
* apachectl is section 8, not 1;jmc2004-12-201-2/+2
|
* convert to mdoc. ok jmcjaredy2004-12-203-91/+131
|
* .Xr dbmmanage 1 ,jmc2004-12-141-1/+2
|
* convert to mdoc;jmc2004-12-141-106/+128
|
* sync usage() w/ SYNOPSIS and remove some verbosity;jmc2004-12-141-16/+7
| | | | ok henning@
* convert to mdoc;jmc2004-12-141-41/+59
|
* OBSD sync;jmc2004-12-141-39/+50
|
* convert to mdoc;jmc2004-12-141-184/+189
|
* sync usage() w/ man page;jmc2004-12-071-7/+7
|
* sync w/ obsd behaviour + tweaks;jmc2004-12-071-82/+93
|
* convert to mdoc;jmc2004-12-071-366/+319
|
* customise for obsd + tweaks;jmc2004-12-061-33/+67
| | | | ok henning@
* kill more dead code, mostly inside #ifdef SOMENONSENSEONSTUPIDOSEShenning2004-12-0647-1097/+10
| | | | | | joint work by Michael Knudsen <e@molioner.dk> and Daniel Ouellet <daniel@presscom.net> with my input no change in binaries
* convert to mdoc;jmc2004-12-061-84/+91
|
* sync usage() w/ man page;jmc2004-12-041-19/+19
| | | | ok henning@
* these pages not used;jmc2004-12-044-1248/+0
| | | | ok henning@
* incredible what for shit is in this codehenning2004-12-041-7/+1
| | | | | | | | | | adding time and date the binary was built is a really really really important and worthwile information, rrrrriiiiiiiigggggghhhht. and for sure a nice way to make the binary changes every time it is built workaround for now (return "unnown") since this stupid piece of crap function is part of the API and modules etc might (ab)use it. king bula sez: what an incredible nonsense pointed out by John Kerbawy <kerbawy@gmail.com>
* king bula sez: rot where the other crap rots shall thesehenning2004-12-034-602/+0
|
* king bula sez: in Attic/ you shall rothenning2004-12-02135-20580/+0
|
* Redirected to /dev/nullhenning2004-12-0222-3421/+0
|
* big time httpd cleanuphenning2004-12-0289-7553/+24
| | | | | | this diff removes a lot of #ifdef'd stuff that is irrelevant for us. done by Daniel Ouellet after my advice. tested by many, ok miod@
* merge changes from mod_ssl 2.8.20, in particular a fix for CAN-2004-0885henning2004-10-202-2/+24
|
* security fix:henning2004-09-081-5/+6
| | | | | | | | | | | | | | | | | Apache's mod_rewrite module can be made to write one zero byte in an arbitrary memory position outside of a char array, causing DoS or possibly buffer overflows. The function lookup_map_dbmfile() in modules/mappers/mod_rewrite.c copies data from a DBM file to the char array buf in a _secure_ manner, but it zero-terminates the array afterwards in an _insecure_ manner. If the key that is looked up has an n bytes long value, a zero byte will be written in the memory position n bytes from the start of the char array buf. exploiting would require enabling dbm for mod_rewrite and getting it to use a malicious dbm file. reported by Ulf.Harnhammar.9485@student.uu.se fix by me ok otto, deraadt
* typos from -f (PR #3907);jmc2004-08-251-2/+2
|
* Make UseCanonicalName off correctly grab port info frombrad2004-07-311-6/+17
| | | | | | the client. Make UseCanonicalName socket port aware. ok henning@
* Fold in backport of 2.0 fix for mod_usertrack core dumpbrad2004-07-261-13/+28
| | | | | | | | when enabled but no explicit CookieName is set. From: Apache CVS ok henning@
* SECURITY: CAN-2004-0492 (cve.mitre.org)henning2004-06-101-0/+7
| | | | | Reject responses from a remote server if sent an invalid (negative) Content-Length. [Mark Cox]
* get changes from mod_ssl 2.8.18:henning2004-06-103-53/+10
| | | | | | | | | | | *) Fix buffer overflow in "SSLOptions +FakeBasicAuth" implementation if the Subject-DN in the client certificate exceeds 6KB in length. (CVE CAN-2004-0488). *) Handle the case of OpenSSL retry requests after interrupted system calls during the SSL handshake phase. *) Remove some unused functions.
* mod_digest for Apache does not properly verify the nonce of a client responsebrad2004-06-074-4/+102
| | | | | | | | by using a AuthNonce secret. CAN-2003-0987 ok henning@
* Apache does not filter terminal escape sequences from its error logs, whichbrad2004-06-073-1/+76
| | | | | | | | | could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. CAN-2003-0020 ok henning@
* Use arc4random(3) to compute random numbers, instead of using rand()otto2004-05-161-14/+6
| | | | | | | to produce a double, snprintf()ing that into a buffer and then converting the string to an int with atoi(). ok millert@ henning@
* Use arc4random(3) instead of rand(3) to compute random numbers.otto2004-05-161-18/+6
| | | | ok millert@ henning@
* ap_server_strip_chroot() is void not int, found by otto while playing withhenning2004-02-102-3/+3
| | | | a etoh diff
* Fix printf format string. ok henning@otto2004-01-154-8/+8
|
* cast vararg sentinel value to pointerotto2004-01-131-1/+1
| | | | ok henning@
* return value at end of non-void functionotto2004-01-131-1/+3
| | | | ok henning@
* Allow and Deny rules with IP addresses outside the class A rangehenning2003-11-211-19/+22
| | | | | | | | | | | (e.g. 192.168.1.1) where parsed incorrectly on sparc64. It only affected IP addresses with no netmask definition. The cause of this was: a) use of the wrong type -- unsigned long instead of a 32bit value b) implicit casts from int to unsigned long with sign extension While doing that fix also some other obvious bugs. from claudio jeker
* merge apache 1.3.29 and mod_ssl 2.8.16henning2003-11-1752-144/+303
| | | | ok brad@
* typo from Tom Cosgrove; this appears to already be fixed in latest httpd;jmc2003-10-301-1/+1
|
* security fix from upcoming apache 1.3.29:henning2003-10-294-14/+14
| | | | | | | | | SECURITY: CAN-2003-0542 (cve.mitre.org) Fix buffer overflows in mod_alias and mod_rewrite which occurred if one configured a regular expression with more than 9 captures. [André Malo] ok markus@
* initgroups() before chroot(), found by Daniel Lucqhenning2003-10-241-3/+9
| | | | ok deraadt@
* use u_int32_t instead of unsigned long, a 32-bit quantity is needed.dhartmei2003-10-171-1/+1
| | | | ok deraadt@
* ugly hack to fix digest authentication for ie, safari et al. FreeBSD PR#55401.jakob2003-10-081-0/+2
| | | | ok henning@
* chroot handling for SSLCertificateChainFile, problem found and fix tested byhenning2003-10-021-1/+2
| | | | Sandor Palfy <netchan@cotse.net>
* use a much more random salt; prompted by ast@domdv.dederaadt2003-09-261-4/+2
|
* when dropping privileges use initgroups(3) instead of setgroups(2) so thehenning2003-09-191-4/+4
| | | | | | secondary groups get initialized as well. ok beck@ deraadt@
* these are not needed here; henning@ ok.fgsch2003-08-2777-41236/+0
|