ID | 18027 |
Package Name | mod_http2 |
Version | 1.15.7 |
Release | 5.module+el8.6.0+438+9a41633c |
Epoch | |
Draft | False |
Source | git+https://git.cclinux.org/stage/rpms/mod_http2#2816220345dc464fec5aa3eef76a968f768b0d4a |
Summary |
Description |
Built by | mbs |
State |
complete
|
Volume |
DEFAULT |
Started | Tue, 17 May 2022 03:51:37 CST |
Completed | Tue, 17 May 2022 04:00:21 CST |
Task | build (module-httpd-2.4-8060020220516185614-d63f516d, /stage/rpms/mod_http2:2816220345dc464fec5aa3eef76a968f768b0d4a) |
Extra | {'source': {'original_url': 'git+https://git.cclinux.org/stage/rpms/mod_http2?#2816220345dc464fec5aa3eef76a968f768b0d4a'}} |
Tags |
|
RPMs |
src | |
|
mod_http2-1.15.7-5.module+el8.6.0+438+9a41633c.src.rpm (info) (download) |
aarch64 |
|
mod_http2-1.15.7-5.module+el8.6.0+438+9a41633c.aarch64.rpm (info) (download)
|
|
mod_http2-debuginfo-1.15.7-5.module+el8.6.0+438+9a41633c.aarch64.rpm (info) (download)
|
|
mod_http2-debugsource-1.15.7-5.module+el8.6.0+438+9a41633c.aarch64.rpm (info) (download)
|
i686 |
|
mod_http2-1.15.7-5.module+el8.6.0+438+9a41633c.i686.rpm (info) (download)
|
|
mod_http2-debuginfo-1.15.7-5.module+el8.6.0+438+9a41633c.i686.rpm (info) (download)
|
|
mod_http2-debugsource-1.15.7-5.module+el8.6.0+438+9a41633c.i686.rpm (info) (download)
|
ppc64le |
|
mod_http2-1.15.7-5.module+el8.6.0+438+9a41633c.ppc64le.rpm (info) (download)
|
|
mod_http2-debuginfo-1.15.7-5.module+el8.6.0+438+9a41633c.ppc64le.rpm (info) (download)
|
|
mod_http2-debugsource-1.15.7-5.module+el8.6.0+438+9a41633c.ppc64le.rpm (info) (download)
|
x86_64 |
|
mod_http2-1.15.7-5.module+el8.6.0+438+9a41633c.x86_64.rpm (info) (download)
|
|
mod_http2-debuginfo-1.15.7-5.module+el8.6.0+438+9a41633c.x86_64.rpm (info) (download)
|
|
mod_http2-debugsource-1.15.7-5.module+el8.6.0+438+9a41633c.x86_64.rpm (info) (download)
|
|
Logs |
|
Changelog |
* Mon Jan 24 2022 Luboš Uhliarik <luhliari@redhat.com> - 1.15.7-5
- Resolves: #2035030 - CVE-2021-44224 httpd:2.4/httpd: possible NULL dereference
or SSRF in forward proxy configurations
* Thu Jan 06 2022 Luboš Uhliarik <luhliari@redhat.com> - 1.15.7-4
- Resolves: #1966728 - CVE-2021-33193 httpd:2.4/mod_http2: httpd:
Request splitting via HTTP/2 method injection and mod_proxy
* Fri Oct 30 2020 Lubos Uhliarik <luhliari@redhat.com> - 1.15.7-3
- Resolves: #1869077 - CVE-2020-11993 httpd:2.4/mod_http2: httpd:
mod_http2 concurrent pool usage
* Mon Aug 17 2020 Lubos Uhliarik <luhliari@redhat.com> - 1.15.7-2
- Resolves: #1869073 - CVE-2020-9490 httpd:2.4/mod_http2: httpd:
Push diary crash on specifically crafted HTTP/2 header
* Tue Apr 14 2020 Lubos Uhliarik <luhliari@redhat.com> - 1.15.7-1
- new version 1.15.7
- Resolves: #1814236 - RFE: mod_http2 rebase
- Resolves: #1747289 - CVE-2019-10082 httpd:2.4/mod_http2: httpd:
read-after-free in h2 connection shutdown
- Resolves: #1696099 - CVE-2019-0197 httpd:2.4/mod_http2: httpd:
mod_http2: possible crash on late upgrade
- Resolves: #1696094 - CVE-2019-0196 httpd:2.4/mod_http2: httpd:
mod_http2: read-after-free on a string compare
- Resolves: #1677591 - CVE-2018-17189 httpd:2.4/mod_http2: httpd:
mod_http2: DoS via slow, unneeded request bodies
* Thu Aug 29 2019 Lubos Uhliarik <luhliari@redhat.com> - 1.11.3-3
- Resolves: #1744999 - CVE-2019-9511 httpd:2.4/mod_http2: HTTP/2: large amount
of data request leads to denial of service
- Resolves: #1745086 - CVE-2019-9516 httpd:2.4/mod_http2: HTTP/2: 0-length
headers leads to denial of service
- Resolves: #1745154 - CVE-2019-9517 httpd:2.4/mod_http2: HTTP/2: request for
large response leads to denial of service
* Thu Apr 04 2019 Joe Orton <jorton@redhat.com> - 1.11.3-2
- update release (#1695587)
* Tue Oct 16 2018 Lubos Uhliarik <luhliari@redhat.com> - 1.11.3-1
- new version 1.11.3
- Resolves: #1633401 - CVE-2018-11763 mod_http2: httpd: DoS for HTTP/2
connections by continuous SETTINGS
* Wed May 02 2018 Joe Orton <jorton@redhat.com> - 1.10.20-1
- update to 1.10.20
* Wed Apr 18 2018 Joe Orton <jorton@redhat.com> - 1.10.18-1
- update to 1.10.18
* Thu Mar 29 2018 Joe Orton <jorton@redhat.com> - 1.10.16-1
- update to 1.10.16 (CVE-2018-1302)
* Thu Feb 08 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1.10.13-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
* Tue Nov 07 2017 Joe Orton <jorton@redhat.com> - 1.10.13-1
- update to 1.10.13
* Fri Oct 20 2017 Joe Orton <jorton@redhat.com> - 1.10.12-1
- update to 1.10.12
* Thu Aug 03 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1.10.10-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
* Mon Jul 31 2017 Joe Orton <jorton@redhat.com> - 1.10.10-1
- update to 1.10.10
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1.10.7-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
* Thu Jul 06 2017 Joe Orton <jorton@redhat.com> - 1.10.7-1
- update to 1.10.7
* Mon Jun 12 2017 Joe Orton <jorton@redhat.com> - 1.10.6-1
- update to 1.10.6
* Tue May 16 2017 Joe Orton <jorton@redhat.com> - 1.10.5-1
- update to 1.10.5
* Mon Apr 10 2017 Luboš Uhliarik <luhliari@redhat.com> - 1.10.1-1
- Initial import (#1440780).
|