004_usr_bin_perl_0wnz_j00
008_make_include_safe
009_apache2_has_dso
010_fhs_compliance
031_apxs2_sucks_more
032_suexec_is_shared
033_dbm_read_hash_or_btree
034_apxs2_libtool_fixtastic
038_no_LD_LIBRARY_PATH
045_suexec_log_cloexec
047_fix_usage_message
052_logresolve_linelength
057_disablemods
058_suexec-CVE-2007-1742
067_fix_segfault_in_ab
071_fix_cacheenable
073_mod_dav_trunk_fixes
074_link_support_progs_with_lcrypt
075_mod_rewrite_literal_ipv6_redirect
076_apxs2_a2enmod
077_CacheIgnoreURLSessionIdentifiers
079_polish_translation
082_ab_num_requests
099_config_guess_sub_update
201_build_suexec-custom
# The patch below must not be applied by quilt at extraction time.  It depends
# on some script-fu to be executed before. Have a look
# to debian/rules' prepare-custom-suexec target.
# If you're aware of that you can uncomment it at any time later and work on it
# as you wish.
#202_suexec-custom
CVE-2012-2687.patch
CVE-2012-4929.patch
CVE-2012-3499_4558.patch
CVE-2013-1862.patch
CVE-2013-1896.patch
CVE-2013-6438.patch
CVE-2014-0098.patch
sni.patch
CVE-2014-0118.patch
CVE-2014-0226.patch
CVE-2014-0231.patch
CVE-2013-5704.patch
ecc_support.patch
tls_options.patch
ephemeral_key_handling.patch
CVE-2015-3183.patch
CVE-2016-5387.patch
CVE-2016-8743.patch
CVE-2016-8743-1.patch
CVE-2016-8743-2.patch
CVE-2016-8743-3.patch
CVE-2016-8743-4.patch
CVE-2017-3167.patch
CVE-2017-3169.patch
CVE-2017-7668.patch
CVE-2017-7679.patch
CVE-2017-9788.patch
CVE-2017-9798.patch
0001-CVE-2017-15710.patch
0002-CVE-2018-1301.patch
0003-CVE-2018-1312-pre.patch
0004-CVE-2018-1312-1.patch
0005-CVE-2018-1312-2.patch
0006-CVE-2019-0217.patch
