[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Пакет mod_auth_openidc-2.4.9.4-5.module+el8.9.0+76+54e02b56.src download

Имя mod_auth_openidc
Эпоха 0
Версия 2.4.9.4
Релиз 5.module+el8.9.0+76+54e02b56
Архитектура src
Сайт https://github.com/zmartzone/mod_auth_openidc
Лицензия ASL 2.0
Время сборки 2024-04-17 01:07:24
Хост сборки builder-x86-04.inferitos.ru
Краткое описание OpenID Connect auth module for Apache HTTP Server
Репозитории AppStream
Полное описание This module enables an Apache 2.x web server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Эррата
Размер 272 КиБ
Исходный проект mod_auth_openidc-2.4.9.4-5.module+el8.9.0+76+54e02b56
Контрольная сумма SHA-256 14791e4f91e902ef3ac2a881f6d0bd00eee63ebad6d7009ef6848f64dd909c13
Module mod_auth_openidc-2.3-8090020240416214641.acbbbf20
× Full screenshot
История изменений link
* Sun Dec 10 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 2.4.9.4-5
- Rebuilt for MSVSphere 8.8

* Tue Apr 25 2023 Tomas Halman <thalman@redhat.com> - 2.4.9.4-5
Related: rhbz#2141850 - fix cjose version dependency

* Mon Apr 24 2023 Tomas Halman <thalman@redhat.com> - 2.4.9.4-4
Resolves: rhbz#2141850 - auth_openidc.conf mode 0640 by default

* Tue Apr 11 2023 Tomas Halman <thalman@redhat.com> - 2.4.9.4-3
- Resolves: rhbz#2184144 - CVE-2023-28625 NULL pointer dereference
      when OIDCStripCookies is set and a crafted Cookie header is supplied

* Tue Feb 21 2023 Tomas Halman <thalman@redhat.com> - 2.4.9.4-2
- Resolves: rhbz#2153659 - CVE-2022-23527 - Open Redirect in
      oidc_validate_redirect_url() using tab character

* Fri Apr 08 2022 Tomas Halman <thalman@redhat.com> - 2.4.9.4-1
- Resolves: rhbz#2025368 - Rebase to new version

* Fri Jan 28 2022 Tomas Halman <thalman@redhat.com> - 2.3.7-11
- Resolves: rhbz#1987222 - CVE-2021-32792 XSS when using OIDCPreservePost On

* Fri Jan 28 2022 Tomas Halman <thalman@redhat.com> - 2.3.7-10
- Resolves: rhbz#1987216 - CVE-2021-32791 hardcoded static IV and AAD with a
                           reused key in AES GCM encryption [rhel-8] (edit)

* Fri Oct 29 2021 Tomas Halman <thalman@redhat.com> - 2.3.7-9
- Resolves: rhbz#2001853 - CVE-2021-39191 open redirect by supplying a crafted URL
                           in the target_link_uri parameter

* Tue Nov 17 2020 Jakub Hrozek <jhrozek@redhat.com> - 2.3.7-8
- Resolves: rhbz#1823756 - Backport SameSite=None cookie from
                           mod_auth_openidc upstream to support latest browsers