httpd-filesystem-2.4.43-24.oe1 >  A f;bW^^f;ރ#pfovߏ޵Ya:9 Tѯ`4i }&I t7ԒLWr_fc?+iXW#ֽ,@pKbI;ߎOK)@Sla~}:9ZrKSN1Xj Yv΅^S|*5IcA[]% J9U=CYܨt=cw6,϶Vqe@5:ADi-|%c3f6604c08cc99fc202e71bc060904c07cc595ecb85eaed8878dd69f37c161629eb583c8ea93ee35ca7dff07c758ed1166111a64<f;bW^^fI"V%8ަpW}u෻Hg 8,ߝFIjw,;;Ӡب)0]K]vG@I 4iۄ5k$էO9c!ƥMUrēZطv 8Eߣ7T}z8skW:1voBFXNgx{߀ih,U@13s/FrI“b/r-qh!ĻNT3Y^Xm]>,>p> `? Pd ! E  &,3  ( @  (@(8 9 : = F G 4H LI dX lY p\ ] ^ b c %d e f l t u v z     LChttpd-filesystem2.4.4324.oe1The basic directory for HTTP ServerThis package contains the basic directory layout for HTTP Server.f;ecs-obsworker-209nopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgASL 2.0http://openeuler.orgUnspecifiedhttps://httpd.apache.org/linuxnoarchgetent group apache >/dev/null || groupadd -g 48 -r apache getent passwd apache >/dev/null || \ useradd -r -u 48 -g apache -s /sbin/nologin \ -d /usr/share/httpd -c "Apache" apache exit 0nAAAAAf;f;f;f;f;f;8935e31406a11aa4a20a2b92782639f9f4eec8882d1ad1503c9cb27a2e9677ecrootrootrootrootrootrootrootrootrootrootrootroothttpd-2.4.43-24.oe1.src.rpmhttpd-filesystem    /bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shadow-utils3.0.4-14.6.0-14.0-15.2-14.15.1f8@eC@d!@d @cۥc@ci@b?bba@chengyechun - 2.4.43-24chengyechun - 2.4.43-23chengyechun - 2.4.43-22chengyechun - 2.4.43-21chengyechun - 2.4.43-20chengyechun - 2.4.43-19chengyechun - 2.4.43-18chengyechun - 2.4.43-17chenzhitao - 2.4.43-16chenzhitao - 2.4.43-15- Type:CVE - ID:CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 - SUG:NA - DESC:fix CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 and sync some patches from upstream- Type:CVE - ID:CVE-2023-31122, CVE-2023-45802 - SUG:NA - DESC:fix CVE-2023-31122 and CVE-2023-45802- Type:CVE - ID:CVE-2019-17567 - SUG:restart - DESC:fix CVE-2019-17567- Type:CVE - ID:CVE-2023-27522, CVE-2023-25690 - SUG:restart - DESC:fix CVE-2023-27522, CVE-2023-25690- Type:CVE - ID:CVE-2022-36760, CVE-2006-20001, CVE-2022-37436 - SUG:restart - DESC:fix CVE-2022-36760,CVE-2006-20001,CVE-2022-37436- Type:CVE - ID:NA - SUG:restart - DESC:add ExecStartPost option to htcacheclean.service for solving error message when htcacheclean starting- Type:CVE - ID: - SUG:restart - DESC:fix the name of the CVE patch- Type:CVE - ID:CVE-2022-28330 - SUG:restart - DESC:fix CVE-2022-28330- Type:CVE - ID:NA - SUG:restart - DESC:fix CVE-2022-28614 CVE-2022-26377 CVE-2022-30522 CVE-2022-28615 CVE-2022-31813- Type:CVE - ID:NA - SUG:restart - DESC:fix CVE2022-29404, CVE2022-30556/bin/shecs-obsworker-209 17151474512.4.43-24.oe1READMEhttpd.service.dhttpd.socket.diconscgi-binhtml/etc/httpd/conf.d//usr/lib/systemd/system//usr/share/httpd//var/www/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/946e3716529d6b9f33930ccf61753151-httpdcpioxz2x86_64-openEuler-linux-gnuASCII textdirectorypۡ5VUutf-8fd02db10e48dc72a6478c2ea0c45052ef1eb40591ce1ad17806f306ca8cc4995? 7zXZ !#,+] b2u Q{LY/4YŨf%@ =?Ɉ B])*+>̀/g2Ӌ  `vLDŋMpN 7~KnPK|5 fP RF)ej9`J :ƥRehg`t,Iw?^y ^m8;J'u_Pq$ia^b`*e}4@[)T ?"%#P?Nt0pe%%ׅ܍p`dG8RG{)XPR0,WM > j2 YZ