Feature rich package for accessing resources via HTTP
http://hc.apache.org/httpclient-3.x/
Although the java.net package provides basic functionality for
accessing resources via HTTP, it doesn't provide the full flexibility
or functionality needed by many applications. The Apache Commons
HttpClient component provides a package implementing the client side
of the most recent HTTP standards and recommendations.
The HttpClient component may be of interest to anyone building
HTTP-aware client applications such as web browsers, web service
clients, or systems that leverage or extend the HTTP protocol for
distributed communication.
- Devel package for openSUSE:Factory
-
2
derived packages
- Links to openSUSE:Factory / apache-comm...httpclient
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout Java:packages/apache-commons-httpclient && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_link | 0000000124 124 Bytes | |
apache-commons-httpclient-CVE-2014-3577.patch | 0000003305 3.23 KB | |
apache-commons-httpclient-CVE-2015-5262.patch | 0000001689 1.65 KB | |
apache-commons-httpclient-addosgimanifest.patch | 0000001365 1.33 KB | |
apache-commons-httpclient-disablecryptotests.patch | 0000000891 891 Bytes | |
apache-commons-httpclient-encoding.patch | 0000001429 1.4 KB | |
apache-commons-httpclient.changes | 0000002975 2.91 KB | |
apache-commons-httpclient.spec | 0000006272 6.13 KB | |
commons-httpclient-3.1-src.tar.gz | 0001882664 1.8 MB | |
commons-httpclient-3.1.pom | 0000007763 7.58 KB | |
commons-httpclient-CVE-2012-5783-2.patch | 0000012655 12.4 KB |
Revision 25 (latest revision is 30)
Fridrich Strba (fstrba)
accepted
request 844266
from
Pedro Monreal Gonzalez (pmonrealgonzalez)
(revision 25)
- Security fix [bsc#945190, CVE-2015-5262] * http/conn/ssl/SSLConnectionSocketFactory.java ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors. - Add apache-commons-httpclient-CVE-2015-5262.patch - Security fix [bsc#1178171, CVE-2014-3577] * org.apache.http.conn.ssl.AbstractVerifier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows MITM attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate. - Add apache-commons-httpclient-CVE-2014-3577.patch
Comments 0