notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Why was the website so slow for so long?

The cause of the slowdown was a change to the ZFS dataset. In conjunction with the database server, very little caching was being done. This combination resulted in increased disk I/O as the system churned through the database. Details in the blog post which outlines the various things which changed. Many graphs.

non port: www/apache22/files/patch-docs__conf__extra__httpd-ssl.conf.in
SVNWeb

Number of commits found: 6

Sun, 2 Aug 2015
[ 19:39 ohauer ] Original commit   Revision:393440
393440 www/apache22/Makefile
393440 www/apache22/distinfo
393440 www/apache22/files/patch-CVE-2015-3183
393440 www/apache22/files/patch-acinclude.m4
393440 www/apache22/files/patch-configure
393440 www/apache22/files/patch-configure.in
393440 www/apache22/files/patch-docs__conf__extra__httpd-ssl.conf.in
393440 www/apache22/files/patch-modules__ssl__ssl_engine_rand.c
393440 www/apache22/files/patch-modules__ssl__ssl_engine_vars.c
393440 www/apache22/files/patch-modules__ssl__ssl_util_ssl.c

(Only the first 10 of 12 ports in this commit are shown above. View all ports for this commit)
- update to 2.2.31
- remove backports
- minor cleanups
- always rebuild configure script
- add patch for acinclude.m4 [1]

Changes with Apache 2.2.31 [2]

  *) Correct win32 build issues for mod_proxy exports, OpenSSL 1.0.x headers.
     [Yann Ylavic, Gregg Smith]

Changes with Apache 2.2.30 (not released)

  *) SECURITY: CVE-2015-3183 (cve.mitre.org)
     core: Fix chunk header parsing defect.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sun, 31 May 2015
[ 12:52 ohauer ] Original commit   Revision:388056
388056 www/apache22/Makefile
388056 www/apache22/files/patch-Makefile.in
388056 www/apache22/files/patch-acinclude.m4
388056 www/apache22/files/patch-config.layout
388056 www/apache22/files/patch-configure.in
388056 www/apache22/files/patch-docs__conf__extra__httpd-mpm.conf.in
388056 www/apache22/files/patch-docs__conf__extra__httpd-ssl.conf.in
388056 www/apache22/files/patch-docs__conf__extra__httpd-userdir.conf.in
388056 www/apache22/files/patch-docs__conf__httpd.conf.in
388056 www/apache22/files/patch-include__ap_config_auto.h.in

(Only the first 10 of 26 ports in this commit are shown above. View all ports for this commit)
- use @sample for conf files
- backport ab from 2.4.x
- fix mode for suexec, cgi test files
- adopt http-ssl.conf.in from upstream trunk
- rebuild some patches
Wed, 1 Feb 2012
[ 18:56 jgh ] Original commit 
1.295 www/apache22/Makefile
1.16 www/apache22/Makefile.doc
1.87 www/apache22/distinfo
1.26 www/apache22/files/patch-Makefile.in
1.4 www/apache22/files/patch-docs__conf__extra__httpd-ssl.conf.in
- Update to 2.2.22

Addresses:
* SECURITY: CVE-2011-3607 (cve.mitre.org)
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP
Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif
module is enabled, allows local users to gain privileges via a .htaccess file
with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request
header, leading to a heap-based buffer overflow.

* SECURITY: CVE-2012-0021 (cve.mitre.org)
The log_cookie function in mod_log_config.c in the mod_log_config module in the
Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not
properly handle a %{}C format string, which allows remote attackers to cause a
denial of service (daemon crash) via a cookie that lacks both a name and a
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Mon, 23 Jan 2012
[ 23:24 pgollucci ] Original commit 
1.3 www/apache22/files/patch-docs__conf__extra__httpd-ssl.conf.in
- Restore inadvertently removed log renames from previous commit

Noticed by:     sunpoet@
Pointy Hat:     pgollucci@
Wed, 18 Jan 2012
[ 03:44 pgollucci ] Original commit 
1.2 www/apache22/files/patch-docs__conf__extra__httpd-ssl.conf.in
- Pull r1227293 from httpd svn
  Note, you have to actually uncomment the include for this to take affect
- No PORTREVISION bump since nothing changes by default

PR:             ports/156987
Reported by:    Adrian Dimcev <adimcev@carbonwind.net>
With Hat:       apache@
Fri, 7 May 2010
[ 00:02 pgollucci ] Original commit 
1.257 www/apache22/Makefile
1.2 www/apache22/files/opt-patch-modules:proxy:mod_proxy_connect.c
1.24 www/apache22/files/patch-Makefile.in
1.8 www/apache22/files/patch-config.layout
1.4 www/apache22/files/patch-configure.in
1.1 www/apache22/files/patch-docs__conf__extra__httpd-ssl.conf.in
1.1 www/apache22/files/patch-docs__conf__extra__httpd-userdir.conf.in
1.1 www/apache22/files/patch-docs__conf__httpd.conf.in
1.3 www/apache22/files/patch-docs_conf_extra_httpd-ssl.conf.in
1.2 www/apache22/files/patch-docs_conf_extra_httpd-userdir.conf.in

(Only the first 10 of 42 ports in this commit are shown above. View all ports for this commit)
- Regenerate patch files with make makepatch for they have
  piled up and additional patches conflict.
  This also will help when we try to syncronize www/apache20&www/apache22
- Unconditionally apply the mod_proxy_connect patch, you just may or may
  not actually compile the file to save some logic in Makefile

With Hat:   apache@

Number of commits found: 6

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
giteaJan 18
drm-current-kmodJan 15
drm-devel-kmodJan 15
drm-fbsd11.2-kmodJan 15
drm-fbsd12.0-kmodJan 15
mariadb101-serverJan 15
mariadb102-serverJan 15
mariadb103-serverJan 15
mariadb104-serverJan 15
mariadb55-serverJan 15
mysql56-serverJan 15
mysql57-serverJan 15
mysql80-serverJan 15
percona55-serverJan 15
percona56-serverJan 15

8 vulnerabilities affecting 139 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-01-20 11:08:01


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 38452
Broken 687
Deprecated 693
Ignore 961
Forbidden 3
Restricted 152
No CDROM 72
Vulnerable 26
Expired 2
Set to expire 665
Interactive 0
new 24 hours 7
new 48 hours8
new 7 days48
new fortnight87
new month198

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.