Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libapr1-0 | Distribution: openSUSE Tumbleweed |
Version: 1.7.6 | Vendor: openSUSE |
Release: 1.1 | Build date: Sat May 24 10:32:54 2025 |
Group: System/Libraries | Build host: reproducible |
Size: 304732 | Source RPM: apr-1.7.6-1.1.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://apr.apache.org/ | |
Summary: Apache Portable Runtime (APR) Library |
APR is Apache's Portable Runtime Library, designed to be a support library that provides a predictable and consistent interface to underlying platform-specific implementations. The range of platform-spanning functionality provided by APR includes: Memory allocation and memory pool functionality, atomic operations, dynamic library handling, file I/O, command-argument parsing, locking, hash tables and arrays, mmap functionality, network sockets and protocols, threads, process and mutex functionality, shared memory functionality, time routines, as well as user and group ID services.
Apache-2.0
* Sat May 24 2025 Andreas Stieger <andreas.stieger@gmx.de> - update to 1.7.6: * build system fixes * fixes to regression tests * fixes for other platforms * Tue Sep 17 2024 pgajdos@suse.com - version update to 1.7.5 [bsc#1229783] CVE-2023-49582 * ) Unix: Implement apr_shm_perms_set() for the "POSIX shm_open()" and "classic mmap" shared memory implementations. [Joe Orton, Ruediger Pluem] * ) Fix missing ';' for XML/HTML hex entities from apr_escape_entity(). [Yann Ylavic] * ) Fix crash in apr_pool_create() with --enable-pool-debug=all|owner. [Yann Ylavic] * ) Improve platform detection by updating config.guess and config.sub. [Rainer Jung] * ) CMake: Add support for CMAKE_WARNING_AS_ERROR. [Ivan Zhakov] * ) CMake: Enable support for MSVC runtime library selection by abstraction. [Ivan Zhakov] * ) CMake: Export installed targets (libapr-1, apr-1, libaprapp-1, aprapp-1) to apr:: namespace. [Ivan Zhakov] - modified patches % apr-visibility.patch (refreshed) % reproducible.patch (refreshed) * Mon Dec 18 2023 Bernhard Wiedemann <bwiedemann@suse.com> - Add reproducible.patch to drop build host name (boo#1084909) * Thu Apr 20 2023 pgajdos@suse.com - version update to 1.7.4 * ) Fix a regression where writing to a file opened with both APR_FOPEN_APPEND and APR_FOPEN_BUFFERED did not properly append the data on Windows. (This regression was introduced in APR 1.7.3) [Evgeny Kotkov] * Sun Apr 16 2023 Dirk Müller <dmueller@suse.com> - update to 1.7.3: * apr-1-config: Fix crosscompiling detection * configure: Add --enable-sysv-shm to use SysV shared memory (shmget) if available. * apr_socket_sendfile: Use WSAIoctl() to get TransmitFile function pointer on Windows. [Ivan Zhakov] * apr_dir_read: Do not request short file names on Windows 7 and later. [Ivan Zhakov] * apr_file_gets: Optimize for buffered files on Windows. * Fix a deadlock when writing to locked files opened with APR_FOPEN_APPEND on Windows. PR 50058. [Evgeny Kotkov] * Don't seek to the end when opening files with APR_FOPEN_APPEND on Windows. * apr_file_write: Optimize large writes to buffered files on Windows. * apr_file_write: Optimize large reads from buffered files on Windows. * Thu Feb 02 2023 Andreas Stieger <andreas.stieger@gmx.de> - update to 1.7.2: * CVE-2022-24963: Integer Overflow or Wraparound vulnerability in apr_encode functions allows an attacker to write beyond bounds of a buffer (boo#1207870) * Add error handling for lseek() failures in apr_file_write() and apr_file_writev() * Avoid an overflow on 32 bit platforms * Don't silently set APR_FOPEN_NOCLEANUP for apr_file_mktemp() created file to avoid a fd and inode leak when/if later passed to apr_file_setaside(). * build system fixes and fixes for other platforms - drop apr-CVE-2021-35940.patch included upstream (CVE-2021-35940) * Sat Mar 26 2022 Stephan Kulow <coolo@suse.com> - Remove autoreconf call, it breaks with uptodate autoconf versions * Tue Feb 22 2022 pgajdos@suse.com - deleted patches - apr-CVE-2021-3594.patch (renamed) - added patches + apr-CVE-2021-35940.patch (correct name) * Tue Oct 19 2021 pgajdos@suse.com - fix shlib-policy-name-error [bsc#1191747] * Thu Sep 02 2021 pgajdos@suse.com - security update - added patches fix CVE-2021-35940 [bsc#1190072], Regression of fix in apr 1.7 + apr-CVE-2021-35940.patch
/usr/lib/libapr-1.so /usr/lib/libapr-1.so.0 /usr/lib/libapr-1.so.0.7.6 /usr/share/doc/packages/libapr1-0 /usr/share/doc/packages/libapr1-0/CHANGES /usr/share/doc/packages/libapr1-0/NOTICE /usr/share/licenses/libapr1-0 /usr/share/licenses/libapr1-0/LICENSE
Generated by rpm2html 1.8.1
Fabrice Bellet, Mon Jul 7 23:52:13 2025