File httpd-2.2.10-CVE-2011-3348.patch of Package apache2

diff -up modules/proxy/mod_proxy_ajp.c.orig-pxyajp modules/proxy/mod_proxy_ajp.c
--- modules/proxy/mod_proxy_ajp.c.orig-pxyajp	2011-09-18 20:55:50.538686569 +0200
+++ modules/proxy/mod_proxy_ajp.c	2011-09-18 20:56:40.013209589 +0200
@@ -189,7 +189,9 @@ static int ap_proxy_ajp_request(apr_pool
                      conn->worker->hostname);
         if (status == AJP_EOVERFLOW)
             return HTTP_BAD_REQUEST;
-        else {
+        else if  (status == AJP_EBAD_METHOD) {
+            return HTTP_NOT_IMPLEMENTED;
+        } else {
             /*
              * This is only non fatal when the method is idempotent. In this
              * case we can dare to retry it with a different worker if we are
openSUSE Build Service is sponsored by