Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

apache2-mod_auth_openidc-2.3.8-lp152.4.1 RPM for armv7hl

From OpenSuSE Ports Leap 15.2 for armv7hl

Name: apache2-mod_auth_openidc Distribution: openSUSE Leap 15.2
Version: 2.3.8 Vendor: openSUSE
Release: lp152.4.1 Build date: Sat Mar 21 16:52:33 2020
Group: Productivity/Networking/Web/Servers Build host: armbuild24
Size: 360940 Source RPM: apache2-mod_auth_openidc-2.3.8-lp152.4.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://github.com/zmartzone/mod_auth_openidc/
Summary: Apache2.x module for an OpenID Connect enabled Identity Provider
This module enables an Apache 2.x web server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.

Provides

Requires

License

Apache-2.0

Changelog

* Wed Mar 04 2020 Kristyna Streitova <kstreitova@suse.com>
  - add apache2-mod_auth_openidc-2.3.8-CVE-2019-20479.patch to fix
    open redirect issue that exists in URLs with a slash and
    backslash at the beginning [bsc#1164459], [CVE-2019-20479]
* Wed Oct 30 2019 Kristyna Streitova <kstreitova@suse.com>
  - add apache2-mod_auth_openidc-2.3.8-CVE-2019-14857.patch to fix
    open redirect issue that exists in URLs with trailing slashes
    [bsc#1153666], [CVE-2019-14857]
* Fri Nov 09 2018 kstreitova@suse.com
  - submission to SLE15SP1 because of fate#324447
  - build with hiredis only for openSUSE where hiredis is available
  - add a version for jansson BuildRequires
* Tue Oct 30 2018 kstreitova@suse.com
  - update to 2.3.8
  - changes in 2.3.8
    * fix return result FALSE when JWT payload parsing fails
    * add LGTM code quality badges
    * fix 3 LGTM alerts
    * improve auto-detection of XMLHttpRequests via Accept header
    * initialize test_proto_authorization_request properly
    * add sanity check on provider->auth_request_method
    * allow usage with LibreSSL
    * don't return content with 503 since it will turn the HTTP
      status code into a 200
    * add option to set an upper limit to the number of concurrent
      state cookies via OIDCStateMaxNumberOfCookies
    * make the default maximum number of parallel state cookies
      7 instead of unlimited
    * fix using access token as endpoint auth method in
      introspection calls
    * fix reading access_token form POST parameters when combined
      with `AuthType auth-openidc`
  - changes in 2.3.7
    * abort when string length for remote user name substitution
      is larger than 255 characters
    * fix Redis concurrency issue when used with multiple vhosts
    * add support for authorization server metadata with
      OIDCOAuthServerMetadataURL as in RFC 8414
    * refactor session object creation
    * clear session cookie and contents if cache corruption is detected
    * use apr_pstrdup when setting r->user
    * reserve 255 characters in remote username substition instead of 50
  - changes in 2.3.6
    * add check to detect session cache corruption for server-based
      caches and cached static metadata
    * avoid using pipelining for Redis
    * send Basic header in OAuth www-authenticate response if that's
      the only accepted method; thanks @puiterwijk
    * refactor Redis cache backend to solve issues on AUTH errors:
      a) memory leak and b) redisGetReply lagging behind
    * adjust copyright year/org
    * fix buffer overflow in shm cache key set strcpy
    * turn missing session_state from warning into a debug statement
    * fix missing "return" on error return from the OP
    * explicitly set encryption kid so we're compatible with
      cjose >= 0.6.0
  - changes in 2.3.5
    * fix encoding of preserved POST data
    * avoid buffer overflow in shm cache key construction
    * compile with with Libressl
* Fri Apr 27 2018 vcizek@suse.com
  - update to 2.3.4
  - requested in fate#323817
* Wed Dec 13 2017 christof.hanke@mpcdf.mpg.de
  - initial packaging

Files

/usr/lib/apache2
/usr/lib/apache2/mod_auth_openidc.so


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 12:19:47 2024