httpd-filesystem-2.4.43-17.oe1 >  A bMW^^f.FM zp(I5t"ltMKH^HeQ/#\r^7pctH6@Mȷ Nߥ3Ii3,F|C,o/!%t`5}/_~_se~d $;pH{k*+pӦ)̽iQR7tMUtl6 9 W9mOBw॥jXE^*1?*4͏55950424782699ef2cfadbd2c2649e73231517b0008eee929fec8fb221b92f82662ec418eea719eb564d625885d36b94dc3315aa8xbMW^^f5o VIo')#X&p.XȈrLrs%r  Ionl('3t[{sm5ৡv;[T3:Y\pNm@Sd]UkGxy[ѧ(ASɉ@*1"le1.Jm#߻FZ(jYz JߤC1N!M, m}=XԃŴXDa~ΕC8~b,}H}MtCU jRb(,>p>?d ! E  &,3  ( @  (@(89$:'= RF ZG xH I X Y \ ] ^b]c]defltuvz%8<BChttpd-filesystem2.4.4317.oe1The basic directory for HTTP ServerThis package contains the basic directory layout for HTTP Server.bMecs-obsworker-208nopenEuler:20.03:LTS:SP3 / standard_x86_64http://openeuler.orgASL 2.0http://openeuler.orgUnspecifiedhttps://httpd.apache.org/linuxnoarchgetent group apache >/dev/null || groupadd -g 48 -r apache getent passwd apache >/dev/null || \ useradd -r -u 48 -g apache -s /sbin/nologin \ -d /usr/share/httpd -c "Apache" apache exit 0nAAAAAbMbMbMbMbMbM8935e31406a11aa4a20a2b92782639f9f4eec8882d1ad1503c9cb27a2e9677ecrootrootrootrootrootrootrootrootrootrootrootroothttpd-2.4.43-17.oe1.src.rpmhttpd-filesystem    /bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shadow-utils3.0.4-14.6.0-14.0-15.2-14.15.1b?bba@b3"aaŶ@aaTU@aS`"@``@`_/@_p~_S}_FNchengyechun - 2.4.43-17chenzhitao - 2.4.43-16chenzhitao - 2.4.43-15gaihuiying - 2.4.43-14quanhongfei - 2.4.43-13gaihuiying - 2.4.43-12gaihuiying - 2.4.43-11gaihuiying - 2.4.43-10gaihuiying - 2.4.43-9gaihuiying - 2.4.43-8gaihuiying - 2.4.43-7yanglu - 2.4.43-6yanglu - 2.4.43-5quanhongfei - 2.4.43-4yuboyun - 2.4.43-3zhaowei - 2.4.43-2yuboyun - 2.4.43-1- Type:CVE - ID:CVE-2022-28330 - SUG:restart - DESC:fix CVE-2022-28330- Type:CVE - ID:NA - SUG:restart - DESC:fix CVE-2022-28614 CVE-2022-26377 CVE-2022-30522 CVE-2022-28615 CVE-2022-31813- Type:CVE - ID:NA - SUG:restart - DESC:fix CVE2022-29404, CVE2022-30556- Type:cves - ID:NA - SUG:restart - DESC:fix CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23934- Type:bugfix - ID:NA - SUG:NA - DESC:fix mod info in configuration- Type:cves - ID:NA - SUG:restart - DESC:fix CVE-2021-44790 CVE-2021-44224- Type:bugfix - ID:NA - SUG:restart - DESC:fix int overflow in ap_timeout_parameter_parse Improve fix to please a fuzzer int overflow- Type:cves - ID:CVE-2021-40438 CVE-2021-39275 - SUG:restart - DESC:fix CVE-2021-40438 fully and correctly fix CVE-2021-39275- Type:cves - ID:CVE-2021-34798 CVE-2021-36160 CVE-2021-40438 - SUG:restart - DESC:fix CVE-2021-34798 CVE-2021-36160 CVE-2021-40438- Type:cves - ID:CVE-2021-26690 - SUG:NA - DESC:fix CVE-2021-26690 modify version number in changelog- Type:cves - ID:CVE-2021-30641 - SUG:NA - DESC:fix CVE-2021-30641- Type:cves - ID:CVE-2020-13950 CVE-2020-35452 - SUG:NA - DESC:fix CVE-2020-13950 CVE-2020-35452- Type:cves - ID:CVE-2021-26691 - SUG:NA - DESC:fix CVE-2021-26691- Type:requirement - ID:NA - SUG:NA - DESC:add httpd-help dependency for httpd- Type:cves - ID:CVE-2020-9490 CVE-2020-11984 CVE-2020-11993 - SUG:restart - DESC:fix CVE-2020-9490CVE-2020-11984CVE-2020-11993- Type:enhancement - ID:NA - SUG:NA - DESC: update source URL- Type:NA - ID:NA - SUG:NA - DESC:Update to 2.4.43/bin/shecs-obsworker-208 16588015852.4.43-17.oe1READMEhttpd.service.dhttpd.socket.diconscgi-binhtml/etc/httpd/conf.d//usr/lib/systemd/system//usr/share/httpd//var/www/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP3/standard_x86_64/a6816d2c60bad376b8540b271161e6ba-httpdcpioxz2x86_64-openEuler-linux-gnuASCII textdirectoryC1g ;utf-821dc2f976ec39ce400cc1ba464e31e14a1193b3106f3c06edfdcdd289ec1a295? 7zXZ !#,+] b2u Q{LT0i9$8Yy* :"%@Ͱ8+t4:?/ƀM>PߦPt87nTbɯ[MԲi^X"G:tyܫ"mqc_xSc#~z4ů% Ì͂LSf @LEL'$NA$/+ &hSc-_{\v֊o՛;FH&*nʐNNUNU4D`t؋|xKqNnTO;>qzp>XSlH\v:z< Ob#tMF3\mUb2FhQ6q( A{´모?.4Vz6\dUT~kwޟT-MX90SQ L 8 YZ