httpd-filesystem-2.4.43-26.oe2003sp40>    g ;G|`u` D 2ΧR>5A$EEe8"'-:;sW>h~%Jtjw^x}TOGIFV&S˘XiԆԎ<$xU.0MLFؿjܘ)Ixx-F0O]shȩEsؗ;ˤ235ErAZhvֆZ%!Y2 t/_ VX:߱T%b(S1}vv)93,6gknX7 ̔u:T[[ee9 Ć[#O@0!ptJ>qG}\k=Is vPe5dce01dc7c1a01a0b6618874f744526a11e05f93ee5451d7cd0e40eca1dbd736e8a80c3baabb2ec77af66fe2f2efec8172b0bbcB=iḬ>; `? Pd ' K     N Tl(8 9 : = F G H I X Y \ ] ^ Mb d e f l t u v z     LChttpd-filesystem2.4.4326.oe2003sp4The basic directory for HTTP ServerThis package contains the basic directory layout for HTTP Server.gwdc-64g.compass-cinASL 2.0http://openeuler.orgUnspecifiedhttps://httpd.apache.org/linuxnoarchgetent group apache >/dev/null || groupadd -g 48 -r apache getent passwd apache >/dev/null || \ useradd -r -u 48 -g apache -s /sbin/nologin \ -d /usr/share/httpd -c "Apache" apache exit 0nAAAAAgggggg8935e31406a11aa4a20a2b92782639f9f4eec8882d1ad1503c9cb27a2e9677ecrootrootrootrootrootrootrootrootrootrootrootroothttpd-2.4.43-26.oe2003sp4.src.rpmhttpd-filesystem    /bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shadow-utils3.0.4-14.6.0-14.0-15.2-14.15.1f@ff:eDd.@d @c@cۥci@Han Jinpeng - 2.4.43-26chengyechun - 2.4.43-25chengyechun - 2.4.43-24chengyechun - 2.4.43-23chengyechun - 2.4.43-22chengyechun - 2.4.43-21chengyechun - 2.4.43-20chengyechun - 2.4.43-19chengyechun- 2.4.43-18- Type:CVE - ID:CVE-2024-40725 - SUG:NA - DESC:fix CVE-2024-40725- Type:CVE - ID:CVE-2024-38473,CVE-2024-38474,CVE-2024-38475,CVE-2024-38476,CVE-2024-38477,CVE-2024-39884,CVE-2024-39573 - SUG:NA - DSEC:fix some CVEs- Type:CVE - ID:CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 - SUG:NA - DESC:fix CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 and sync some patches from upstream- Type:CVE - ID:CVE-2023-31122, CVE-2023-45802 - SUG:restart - DESC:fix CVE-2023-31122 and CVE-2023-45802- Type:CVE - ID:CVE-2019-17567 - SUG:restart - DESC:fix CVE-2019-17567- Type:CVE - ID:CVE-2023-27522, CVE-2023-25690 - SUG:restart - DESC:fix CVE-2023-27522, CVE-2023-25690- Type:bugfix - ID:NA - SUG:restart - DESC:add ExecStartPost option to htcacheclean.service for solving error message when htcacheclean starting- Type:CVE - ID:CVE-2022-36760, CVE-2006-20001, CVE-2022-37436 - SUG:restart - DESC:fix CVE-2022-36760,CVE-2006-20001,CVE-2022-37436- Type:bugfix - ID:NA - SUG:restart - DESC:fix the name of the CVE patch/bin/shdc-64g.compass-ci 17296751272.4.43-26.oe2003sp4READMEhttpd.service.dhttpd.socket.diconscgi-binhtml/etc/httpd/conf.d//usr/lib/systemd/system//usr/share/httpd//var/www/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-openEuler-linux-gnuASCII textdirectoryEc'Ja/$܍}utf-8d4a634fd360536b4943a69c1259c345f53e6a19da8bf67ae310ae3d859c9aa05?P7zXZ !#,+] b2u Q{LZ驂A.;ns'cxw{LNa8Uhs|ZTBKs*;0$#O_vpB}_״\19\ :J&lWbHTt̖DV!0d}P71\1Pr-Wg "F$zxrNVV<68ǝv.*z#&2P,kJhY@ij'Oެ![T ~L?W& W2aKÙ&#?aHe97/3C(c8 uam4<1Ӟ%z _ P.ytJ( D6ss6"K T/s߫7|z:M$"zN+;,]ёM@/wM 8 YZ