File httpd-2.2.13-CVE-2011-3348.patch of Package apache2

diff -up modules/proxy/mod_proxy_ajp.c.orig-pxyajp modules/proxy/mod_proxy_ajp.c
--- modules/proxy/mod_proxy_ajp.c.orig-pxyajp	2011-09-18 20:55:59.859596820 +0200
+++ modules/proxy/mod_proxy_ajp.c	2011-09-18 20:58:48.177967212 +0200
@@ -213,7 +213,9 @@ static int ap_proxy_ajp_request(apr_pool
                      conn->worker->hostname);
         if (status == AJP_EOVERFLOW)
             return HTTP_BAD_REQUEST;
-        else {
+        else if  (status == AJP_EBAD_METHOD) {
+            return HTTP_NOT_IMPLEMENTED;
+        } else {
             /*
              * This is only non fatal when the method is idempotent. In this
              * case we can dare to retry it with a different worker if we are
openSUSE Build Service is sponsored by