[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Пакет mod_auth_openidc-2.4.9.4-5.module+el8.9.0+76+54e02b56.x86_64 download

Имя mod_auth_openidc
Эпоха 0
Версия 2.4.9.4
Релиз 5.module+el8.9.0+76+54e02b56
Архитектура x86_64
Сайт https://github.com/zmartzone/mod_auth_openidc
Лицензия ASL 2.0
Время сборки 2024-04-17 01:07:07
Хост сборки builder-x86-03.inferitos.ru
Краткое описание OpenID Connect auth module for Apache HTTP Server
Репозитории AppStream
Полное описание This module enables an Apache 2.x web server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Эррата
Размер 197 КиБ
Исходный проект mod_auth_openidc-2.4.9.4-5.module+el8.9.0+76+54e02b56
Контрольная сумма SHA-256 8f4b400425ca965ff86d2facc8d6b849f097e01f3736413ba0f7901b09f7108e
Module mod_auth_openidc-2.3-8090020240416214641.acbbbf20
× Full screenshot
История изменений link
* Sun Dec 10 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 2.4.9.4-5
- Rebuilt for MSVSphere 8.8

* Tue Apr 25 2023 Tomas Halman <thalman@redhat.com> - 2.4.9.4-5
Related: rhbz#2141850 - fix cjose version dependency

* Mon Apr 24 2023 Tomas Halman <thalman@redhat.com> - 2.4.9.4-4
Resolves: rhbz#2141850 - auth_openidc.conf mode 0640 by default

* Tue Apr 11 2023 Tomas Halman <thalman@redhat.com> - 2.4.9.4-3
- Resolves: rhbz#2184144 - CVE-2023-28625 NULL pointer dereference
      when OIDCStripCookies is set and a crafted Cookie header is supplied

* Tue Feb 21 2023 Tomas Halman <thalman@redhat.com> - 2.4.9.4-2
- Resolves: rhbz#2153659 - CVE-2022-23527 - Open Redirect in
      oidc_validate_redirect_url() using tab character

* Fri Apr 08 2022 Tomas Halman <thalman@redhat.com> - 2.4.9.4-1
- Resolves: rhbz#2025368 - Rebase to new version

* Fri Jan 28 2022 Tomas Halman <thalman@redhat.com> - 2.3.7-11
- Resolves: rhbz#1987222 - CVE-2021-32792 XSS when using OIDCPreservePost On

* Fri Jan 28 2022 Tomas Halman <thalman@redhat.com> - 2.3.7-10
- Resolves: rhbz#1987216 - CVE-2021-32791 hardcoded static IV and AAD with a
                           reused key in AES GCM encryption [rhel-8] (edit)

* Fri Oct 29 2021 Tomas Halman <thalman@redhat.com> - 2.3.7-9
- Resolves: rhbz#2001853 - CVE-2021-39191 open redirect by supplying a crafted URL
                           in the target_link_uri parameter

* Tue Nov 17 2020 Jakub Hrozek <jhrozek@redhat.com> - 2.3.7-8
- Resolves: rhbz#1823756 - Backport SameSite=None cookie from
                           mod_auth_openidc upstream to support latest browsers