Feature rich package for accessing resources via HTTP

Edit Package apache-commons-httpclient
http://hc.apache.org/httpclient-3.x/

Although the java.net package provides basic functionality for
accessing resources via HTTP, it doesn't provide the full flexibility
or functionality needed by many applications. The Apache Commons
HttpClient component provides a package implementing the client side
of the most recent HTTP standards and recommendations.

The HttpClient component may be of interest to anyone building
HTTP-aware client applications such as web browsers, web service
clients, or systems that leverage or extend the HTTP protocol for
distributed communication.

Refresh
Refresh
Source Files
Filename Size Changed
apache-commons-httpclient-CVE-2014-3577.patch 0000003305 3.23 KB
apache-commons-httpclient-CVE-2015-5262.patch 0000001689 1.65 KB
apache-commons-httpclient-addosgimanifest.patch 0000001365 1.33 KB
apache-commons-httpclient-disablecryptotests.patch 0000000891 891 Bytes
apache-commons-httpclient-encoding.patch 0000001429 1.4 KB
apache-commons-httpclient.changes 0000002975 2.91 KB
apache-commons-httpclient.spec 0000006272 6.13 KB
commons-httpclient-3.1-src.tar.gz 0001882664 1.8 MB
commons-httpclient-3.1.pom 0000007763 7.58 KB
commons-httpclient-CVE-2012-5783-2.patch 0000012655 12.4 KB
Revision 25 (latest revision is 30)
Fridrich Strba's avatar Fridrich Strba (fstrba) accepted request 844266 from Pedro Monreal Gonzalez's avatar Pedro Monreal Gonzalez (pmonrealgonzalez) (revision 25)
- Security fix [bsc#945190, CVE-2015-5262]
  * http/conn/ssl/SSLConnectionSocketFactory.java ignores the
    http.socket.timeout configuration setting during an SSL handshake,
    which allows remote attackers to cause a denial of service (HTTPS
    call hang) via unspecified vectors.
- Add apache-commons-httpclient-CVE-2015-5262.patch

- Security fix [bsc#1178171, CVE-2014-3577]
  * org.apache.http.conn.ssl.AbstractVerifier does not properly
    verify that the server hostname matches a domain name in the
    subject's Common Name (CN) or subjectAltName field of the X.509
    certificate, which allows MITM attackers to spoof SSL servers
    via a "CN=" string in a field in the distinguished name (DN)
    of a certificate.
- Add apache-commons-httpclient-CVE-2014-3577.patch
Comments 0
openSUSE Build Service is sponsored by