unofficial mirror of guix-devel@gnu.org 
 help / color / mirror / code / Atom feed
blob 6988bc33734f3a211b747ebdaf7955af4e3ebc01 1652 bytes (raw)
name: gnu/packages/patches/httpd-cve-2016-8740.patch 	 # note: path name is non-authoritative(*)

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
 
Fix CVE-2016-8740 (mod_http2: properly crafted, endless HTTP/2 CONTINUATION
frames could be used to exhaust all server's memory.):

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740
https://httpd.apache.org/security/vulnerabilities_24.html

Patched copied from upstream mailing list:
https://mail-archives.apache.org/mod_mbox/httpd-announce/201612.mbox/%3C1A097A43-7CCB-4BA1-861F-E0C7EEE83A4B%40apache.org%3E

Index: modules/http2/h2_stream.c
===================================================================
--- a/modules/http2/h2_stream.c	(revision 1771866)
+++ b/modules/http2/h2_stream.c	(working copy)
@@ -322,18 +322,18 @@
                                            HTTP_REQUEST_HEADER_FIELDS_TOO_LARGE);
             }
         }
-    }
-    
-    if (h2_stream_is_scheduled(stream)) {
-        return h2_request_add_trailer(stream->request, stream->pool,
-                                      name, nlen, value, vlen);
-    }
-    else {
-        if (!input_open(stream)) {
-            return APR_ECONNRESET;
+        
+        if (h2_stream_is_scheduled(stream)) {
+            return h2_request_add_trailer(stream->request, stream->pool,
+                                          name, nlen, value, vlen);
         }
-        return h2_request_add_header(stream->request, stream->pool,
-                                     name, nlen, value, vlen);
+        else {
+            if (!input_open(stream)) {
+                return APR_ECONNRESET;
+            }
+            return h2_request_add_header(stream->request, stream->pool,
+                                         name, nlen, value, vlen);
+        }
     }
 }
 

debug log:

solving 6988bc337 ...
found 6988bc337 in https://yhetil.org/guix-devel/9c1156dad85b54e71fca1a73ec8f24e31f82d8e4.1481009302.git.leo@famulari.name/

applying [1/1] https://yhetil.org/guix-devel/9c1156dad85b54e71fca1a73ec8f24e31f82d8e4.1481009302.git.leo@famulari.name/
diff --git a/gnu/packages/patches/httpd-cve-2016-8740.patch b/gnu/packages/patches/httpd-cve-2016-8740.patch
new file mode 100644
index 000000000..6988bc337

1:25: trailing whitespace.
-    
1:33: trailing whitespace.
+        
1:49: trailing whitespace.
 
Checking patch gnu/packages/patches/httpd-cve-2016-8740.patch...
1:49: new blank line at EOF.
+
Applied patch gnu/packages/patches/httpd-cve-2016-8740.patch cleanly.
warning: 4 lines add whitespace errors.

index at:
100644 6988bc33734f3a211b747ebdaf7955af4e3ebc01	gnu/packages/patches/httpd-cve-2016-8740.patch

(*) Git path names are given by the tree(s) the blob belongs to.
    Blobs themselves have no identifier aside from the hash of its contents.^

Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).