httpd-filesystem-2.4.51-17.oe2203sp2>  <@PT@7!.ܶujG7odFopeneuler@compass-ci.com G7oI ` 8dKA]ےF4~ HB4ǧչGr+ J NQޒ^0aYSV8.`J4ݮHx6rf᳗g|"b'L.>:"W|"CW~`r0:.·Xkb=At 3vNDR)2li#{\L]\Y)'vMl^=hQGCrdIo&lBRlwz&lZ8|RUFeo:+D3W \Ή=x"2ٵ:B.1j첽S`3$3ۊ" LkS[­I(EQ{=9i4j22c561374104ae9303ca1b04bd17eb27fafa9571f747d7d0eeae8cc00d0b57ce11172cf725fbd842b25a6404a0af6b3e0e54124a%9l͗՘,><?d ' K     N Tl(89:h=FGHIX$Y(\<]T^bdefltuvz-@DJChttpd-filesystem2.4.5117.oe2203sp2The basic directory for HTTP ServerThis package contains the basic directory layout for HTTP Server.ddc-64g.compass-cinASL 2.0http://openeuler.orgUnspecifiedhttps://httpd.apache.org/linuxnoarchgetent group apache >/dev/null || groupadd -g 48 -r apache getent passwd apache >/dev/null || \ useradd -r -u 48 -g apache -s /sbin/nologin \ -d /usr/share/httpd -c "Apache" apache exit 0nAAAAAd;d;d;d;d;d;8935e31406a11aa4a20a2b92782639f9f4eec8882d1ad1503c9cb27a2e9677ecrootrootrootrootrootrootrootrootrootrootrootroothttpd-2.4.51-17.oe2203sp2.src.rpmhttpd-filesystem    /bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shadow-utils3.0.4-14.6.0-14.0-15.2-14.17.0d@d9@@d d @cۥcFccb@b@blbb4t@b3"aa+@aA@aTU@aS`@`"@``@`chengyechun - 2.4.51-17chengyechun - 2.4.51-16chengyechun - 2.4.51-15chengyechun - 2.4.51-14seuzw <930zhaowei@163.com> - 2.4.51-13chengyechun - 2.4.51-12chengyechun - 2.4.51-11chengyechun - 2.4.51-10chengyechun - 2.4.51-9chengyechun - 2.4.51-8chengyechun - 2.4.51-7chengyechun - 2.4.51-6gaihuiying - 2.4.51-5gaihuiying - 2.4.51-4quanhongfei - 2.4.51-3gaihuiying - 2.4.51-2yanglu - 2.4.51-1gaihuiying - 2.4.48-3gaihuiying - 2.4.48-2gaihuiying - 2.4.48-1gaihuiying - 2.4.46-5gaihuiying - 2.4.46-4yanglu - 2.4.46-3yanglu - 2.4.46-2- Type:bugfix - ID: - SUG:restart - DESC:add ExecStartPost option to htcacheclean.service for solving error message when htcacheclean starting- Type:bugfix - ID: - SUG:restart - DESC:Report an error if the AJP backend sends an invalid number of headers handled a negative value when parsing the config avoid delimiting the query with a backreference fix missing APLOGNO- Type:CVE - ID:CVE-2023-27522, CVE-2023-25690 - SUG:restart - DESC:fix CVE-2023-27522, CVE-2023-25690- Type:bugfix - ID:NA - SUG:restart - DESC:mod_dav:open the lock database read-only when possible- Type:cves - ID:CVE-2022-36760,CVE-2006-20001,CVE-2022-37436 - SUG:restart - DESC:fix CVE-2022-36760,CVE-2006-20001,CVE-2022-37436- Type:bugfix - ID: - SUG:restart - DESC:reduce the dependency of httpd on system-logos installation- Type:bugfix - ID: - SUG:restart - DESC:change default value of HeartbeatMaxServers fix setting and comparison of IPs fileds avoid voerflow in case of indecently large session make ap_escape_quotes() work correctly fix lua_request with cast first Handle children killed pathologically mod_md do not interfere with requests if challenge type http-01- Type:bugfix - ID: - SUG:restart - DESC:fix the name of the CVE patch- Type:CVE - ID:CVE-2022-28330 - SUG:restart - DESC:fix CVE-2022-28330- Type:CVE - ID:NA - SUG:restart - DESC:fix CVE-2022-31813,CVE-2022-28614,CVE-2022-29404,CVE-2022-26377,CVE-2022-30522,CVE-2022-30556- Type:CVE - ID:NA - SUG:restart - DESC:fix CVE-2022-28615- Type:bugfix - ID:NA - SUG:restart - DESC:switch from PCRE to PCRE2- Type:cves - ID:NA - SUG:restart - DESC:fix CVE-2021-44790 CVE-2021-44224- Type:cves - ID:NA - SUG:restart - DESC:fix CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23934- Type:bugfix - ID:NA - SUG:restart - DESC:fix mod info in configuration- Type:bugfix - ID:NA - SUG:NA - DESC:fix build error of "SSL_PROTOCAL_SSLV3 undeclared"- Type:requirement - ID:NA - SUG:NA - DESC:update httpd to 2.4.51- Type:cves - ID:CVE-2021-40438 CVE-2021-39275 - SUG:restart - DESC:fix CVE-2021-40438 fully and correctly fix CVE-2021-39275- Type:cves - ID:CVE-2021-34798 CVE-2021-36160 CVE-2021-40438 - SUG:restart - DESC:fix CVE-2021-34798 CVE-2021-36160 CVE-2021-40438- Type:requirement - ID:NA - SUG:NA - DESC:update to 2.4.48- Type:cves - ID:CVE-2021-26690 - SUG:NA - DESC:fix CVE-2021-26690- Type:cves - ID:CVE-2021-30641 - SUG:NA - DESC:fix CVE-2021-30641- Type:cves - ID:CVE-2020-13950 CVE-2020-35452 - SUG:NA - DESC:fix CVE-2020-13950 CVE-2020-35452- Type:cves - ID:CVE-2021-26691 - SUG:NA - DESC:fix CVE-2021-26691/bin/shdc-64g.compass-ci 16879334192.4.51-17.oe2203sp2READMEhttpd.service.dhttpd.socket.diconscgi-binhtml/etc/httpd/conf.d//usr/lib/systemd/system//usr/share/httpd//var/www/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-openEuler-linux-gnuASCII textdirectory1AќL:utf-86a2b79d9229c850a524d1abcdd841d11404d556c2c0c350bce15fc779f36023ae224f34cdd175be87d51babfdd8b8cb2440358850ce9df986099bc1ffcccd2ab?@7zXZ !#,+] b2u Q{LVO_V6@C>HT,}W9W7fM$)w,/b $of xm_?@Dxm𤤗HwP.,cuMS5(ܼvp)8V #hbk`#!mأmEzx{^m?أCvׇ(QNP"4}ulu?SeOm0iBCW¨78k!#B4JSbIL8 {AƳ7=6p]84+3yr×L!P95/1j.A&O3FG,u7\ s_Бo&%ьQ H"W|Mcbύi^/lG$L[}Q݋DX ߘ`ҫ j2 YZ