apache: security bump to 2.4.46 13054/head
authorSebastian Kemper <sebastian_ml@gmx.net>
Sat, 8 Aug 2020 14:15:43 +0000 (16:15 +0200)
committerSebastian Kemper <sebastian_ml@gmx.net>
Sat, 8 Aug 2020 14:19:45 +0000 (16:19 +0200)
commitf5a57e42ca6f59ccac963a019ea6275642a1ffb2
treee57d1f188ace785a7e06f7fd917089aa196df686
parent61f3bd507c4688f031e710b847fa0f0767bda6b1
apache: security bump to 2.4.46

From CHANGES_2.4:

SECURITY: CVE-2020-11984 (cve.mitre.org)
  mod_proxy_uwsgi: Malicious request may result in information disclosure
  or RCE of existing file on the server running under a malicious process
  environment. [Yann Ylavic]

SECURITY: CVE-2020-11993 (cve.mitre.org)
  mod_http2: when throttling connection requests, log statements
  where possibly made that result in concurrent, unsafe use of
  a memory pool. [Stefan Eissing]

SECURITY:
  mod_http2: a specially crafted value for the 'Cache-Digest' header
  request would result in a crash when the server actually tries
  to HTTP/2 PUSH a resource afterwards.
  [Stefan Eissing, Eric Covener, Christophe Jaillet]

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
net/apache/Makefile