development/libraries

httpd-devel - 아파치 HTTP 서버를 이용한 개발 도구

Website: http://httpd.apache.org/
License: ASL 2.0
Vendor: AnNyung Packaging Team
Description:
The httpd-devel package contains the APXS binary and other files
that you need to build Dynamic Shared Objects (DSOs) for the
Apache HTTP Server.

If you are installing the Apache HTTP server and you want to be
able to compile or develop additional modules for Apache, you need
to install this package.

Packages

httpd-devel-2.2.34-3.an2.i686 [547 KiB] Changelog by JoungKyun.Kim (2019-05-13):
- fixed missing APR_HAS_THREADS check on mod_proxy 
  2.2.34 official patch
httpd-devel-2.2.34-2.an2.i686 [538 KiB] Changelog by JoungKyun.Kim (2017-10-14):
- security issues
  . CVD-2017-9798
    Corrupted or freed memory access. <Limit[Except]> must now be used in the
    main configuration file (httpd.conf) to register HTTP methods before the
    .htaccess files.
httpd-devel-2.2.34-1.an2.i686 [538 KiB] Changelog by JoungKyun.Kim (2017-07-17):
- update 2.2.34
  http://www.apache.org/dist/httpd/CHANGES_2.2.34
- security issues:
  . CVE-2017-7668
    The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a
    bug in token list parsing, which allows ap_find_token() to search past
    the end of its input string. By maliciously crafting a sequence of
    request headers, an attacker may be able to cause a segmentation fault,
    or to force ap_find_token() to return an incorrect value.
  . CVE-2017-3169
    mod_ssl may dereference a NULL pointer when third-party modules call
    ap_hook_process_connection() during an HTTP request to an HTTPS port.
  . CVE-2017-3167
    Use of the ap_get_basic_auth_pw() by third-party modules outside of the
    authentication phase may lead to authentication requirements being
    bypassed.
  . CVE-2017-7679
    mod_mime can read one byte past the end of a buffer when sending a
    malicious Content-Type response header.
httpd-devel-2.2.32-1.an2.i686 [523 KiB] Changelog by JoungKyun.Kim (2017-01-22):
- update 2.2.32
  http://www.apache.org/dist/httpd/CHANGES_2.2.32
- security issues:
  . CVE-2016-8743
    Enforce HTTP request grammar corresponding to RFC7230 for request lines
    and request headers, to prevent response splitting and cache pollution by
    malicious clients or downstream proxies.
httpd-devel-2.2.31-2.an2.i686 [504 KiB] Changelog by JoungKyun.Kim (2016-07-20):
- security issues:
  . CVE-2016-5387
    The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and
    therefore does not protect applications from the presence of untrusted
    client data in the HTTP_PROXY environment variable, which might allow
    remote attackers to redirect an application's outbound HTTP traffic to an
    arbitrary proxy server via a crafted Proxy header in an HTTP request, aka
    an "httpoxy" issue.
httpd-devel-2.2.31-1.an2.i686 [504 KiB] Changelog by JoungKyun.Kim (2015-08-16):
- update 2.2.31
- security issues:
  . CVE-2015-3183
    Remove apr_brigade_flatten(), buffering and duplicated code from
    the HTTP_IN filter, parse chunks in a single pass with zero copy.
    Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext
    authorized characters
httpd-devel-2.2.29-1.an2.i686 [503 KiB] Changelog by JoungKyun.Kim (2014-09-23):
- security issues:
  . CVE-2013-5704
    The mod_headers module in the Apache HTTP Server 2.2.22 allows
	remote attackers to bypass "RequestHeader unset" directives by
	placing a header in the trailer portion of data sent with chunked
	transfer coding.
httpd-devel-2.2.27-2.an2.i686 [501 KiB] Changelog by JoungKyun.Kim (2014-07-30):
- security issues:
  . CVE-2014-0118
    The deflate_in_filter function in mod_deflate.c in the mod_deflate
    module in the Apache HTTP Server before 2.4.10, when request body
    decompression is enabled, allows remote attackers to cause a denial
    of service (resource consumption) via crafted request data that
    decompresses to a much larger size.

  . CVE-2014-0226
    Race condition in the mod_status module in the Apache HTTP Server
    before 2.4.10 allows remote attackers to cause a denial of service
    (heap-based buffer overflow), or possibly obtain sensitive credential
    information or execute arbitrary code, via a crafted request that
    triggers improper scoreboard handling within the status_handler
    function in modules/generators/mod_status.c and the
    lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

  . CVE-2014-0231
    The mod_cgid module in the Apache HTTP Server before 2.4.10 does not
    have a timeout mechanism, which allows remote attackers to cause a
    denial of service (process hang) via a request to a CGI script that
    does not read from its stdin file descriptor.
httpd-devel-2.2.27-1.an2.i686 [500 KiB] Changelog by JoungKyun.Kim (2014-04-05):
- update 2.2.27
  . see also http://www.apache.org/dist/httpd/CHANGES_2.2.27

- support NPN on mod_ssl

- security issues:
  . CVE-2014-0098
    Clean up cookie logging with fewer redundant string parsing passes.
    Log only cookies with a value assignment. Prevents segfaults when
    logging truncated cookies.

  . CVE-2013-6438
    mod_dav: Keep track of length of cdata properly when removing
    leading spaces. Eliminates a potential denial of service from
    specifically crafted DAV WRITE requests
httpd-devel-2.2.26-1.an2.i686 [487 KiB] Changelog by JoungKyun.Kim (2014-02-07):
- update 2.2.26
  . see also http://www.apache.org/dist/httpd/CHANGES_2.2.26
httpd-devel-2.2.25-1.an2.i686 [486 KiB] Changelog by JoungKyun.Kim (2013-07-06):
- update 2.2.25
  . see also http://www.apache.org/dist/httpd/CHANGES_2.2.25

- security issues:
  . CVE-2013-1862
    mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server
    2.2.x before 2.2.25 writes data to a log file without sanitizing
    non-printable characters, which might allow remote attackers to
    execute arbitrary commands via an HTTP request containing an escape
    sequence for a terminal emulator.
httpd-devel-2.2.24-1.an2.i686 [480 KiB] Changelog by JoungKyun.Kim (2013-03-08):
- update 2.2.24
  . see also http://www.apache.org/dist/httpd/CHANGES_2.2.24

- security issues:
  . CVE-2012-3499
    Various XSS flaws due to unescaped hostnames and URIs HTML output in
    mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.

  . CVE-2012-4558
    XSS in mod_proxy_balancer manager interface.
httpd-devel-2.2.23-2.an2.i686 [479 KiB] Changelog by JoungKyun.Kim (2012-11-09):
- fixed work binary
httpd-devel-2.2.23-1.an2.i686 [132 KiB] Changelog by JoungKyun.Kim (2012-10-12):
- update 2.2.23
- fixed CVE-2012-0883
- fixed CVE-2012-2687
httpd-devel-2.2.22-3.an2.i686 [139 KiB] Changelog by JoungKyun.Kim (2012-06-08):
- momve to /var/log/httpd to httpd-conf package

Listing created by Repoview-0.6.6-1.el6