httpd-filesystem-2.4.51-23.oe2203sp30>    gi ;G|`u`  Lbv)ni0=bQOHR;2l!N"A CIx%LQ̩/QY'EA"y++6N|i9ls?d/j~rYg. ߾"kWMĀM)SSDbaA{R՝̎Bysin?>Q(FzN|rC}]oʚ߰<?d ' K     N Tl(89:=FGHIXY\]^Ibd|efltuvzHLChttpd-filesystem2.4.5123.oe2203sp3The basic directory for HTTP ServerThis package contains the basic directory layout for HTTP Server.gdc-64g.compass-cinASL 2.0http://openeuler.orgUnspecifiedhttps://httpd.apache.org/linuxnoarchgetent group apache >/dev/null || groupadd -g 48 -r apache getent passwd apache >/dev/null || \ useradd -r -u 48 -g apache -s /sbin/nologin \ -d /usr/share/httpd -c "Apache" apache exit 0nAAAAAgMgNgNgSgSgS8935e31406a11aa4a20a2b92782639f9f4eec8882d1ad1503c9cb27a2e9677ecrootrootrootrootrootrootrootrootrootrootrootroothttpd-2.4.51-23.oe2203sp3.src.rpmhttpd-filesystem    /bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shadow-utils3.0.4-14.6.0-14.0-15.2-14.17.0f@f1f:eDeDddm@d9@@d d @cۥcFccHan Jinpeng - 2.4.51-23chengyechun - 2.4.51-22chengyechun - 2.4.51-21chengyechun - 2.4.51-20chengyechun - 2.4.51-19panchenbo - 2.4.51-18chengyechun - 2.4.51-17chengyechun - 2.4.51-16chengyechun - 2.4.51-15chengyechun - 2.4.51-14seuzw <930zhaowei@163.com> - 2.4.51-13chengyechun - 2.4.51-12chengyechun - 2.4.51-11chengyechun - 2.4.51-10- Type:CVE - ID:CVE-2024-40725 - SUG:NA - DESC:fix CVE-2024-40725- Type:CVE - ID:CVE-2024-38473,CVE-2024-38474,CVE-2024-38475,CVE-2024-38476,CVE-2024-38477,CVE-2024-39884,CVE-2024-39573 - SUG:NA - DSEC:fix some CVEs- Type:CVE - ID:CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 - SUG:NA - DESC:fix CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 and sync some patches from upstream- Type:CVE - ID:CVE-2023-45802 - SUG:NA - DESC:fix CVE-2023-45802- Type:CVE - ID:CVE-2023-31122 - SUG:NA - DESC:fix CVE-2023-31122- Type:bugfix - ID: - SUG:NA - DESC:add sw_64 support,optimize sw build patch,add loongarch64 support- Type:bugfix - ID: - SUG:restart - DESC:Fix double encoding of the uri-path of the request Do not match the extention against possible query string Do not double encode slashes Check before forwarding that a nocanon path has not been rewriteen- Type:bugfix - ID: - SUG:restart - DESC:Report an error if the AJP backend sends an invalid number of headers handled a negative value when parsing the config avoid delimiting the query with a backreference fix missing APLOGNO- Type:CVE - ID:CVE-2023-27522, CVE-2023-25690 - SUG:restart - DESC:fix CVE-2023-27522, CVE-2023-25690- Type:bugfix - ID:NA - SUG:restart - DESC:mod_dav:open the lock database read-only when possible- Type:cves - ID:CVE-2022-36760,CVE-2006-20001,CVE-2022-37436 - SUG:restart - DESC:fix CVE-2022-36760,CVE-2006-20001,CVE-2022-37436- Type:bugfix - ID: - SUG:restart - DESC:reduce the dependency of httpd on system-logos installation- Type:bugfix - ID: - SUG:restart - DESC:change default value of HeartbeatMaxServers fix setting and comparison of IPs fileds avoid voerflow in case of indecently large session make ap_escape_quotes() work correctly fix lua_request with cast first Handle children killed pathologically mod_md do not interfere with requests if challenge type http-01- Type:bugfix - ID: - SUG:restart - DESC:fix the name of the CVE patch/bin/shdc-64g.compass-ci 17296867412.4.51-23.oe2203sp3READMEhttpd.service.dhttpd.socket.diconscgi-binhtml/etc/httpd/conf.d//usr/lib/systemd/system//usr/share/httpd//var/www/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-openEuler-linux-gnuASCII textdirectory=Fxd@Lޕutf-8cad3397d31e14b29587ab2b6937251302d56a8e37dec9ef85c10b1403e10978d472853d6bcae417bafa3207fc1fc37bf2c425b079ea317d3ebb4ba751383203e?@7zXZ !#,+] b2u Q{LZcxTK\oLCv6vV=φ k=Q*O?Hpa " [Dhm`%j9oq L]M|_OVGBu6@<nLS眹NHWu}u):zD0Ҝ愨u3@G`"qvn-\JԞ9%{}V Xׯ=m]xm/䲩C걔:~<񑌴C/u.eWW70xs5Lmш {Yn|M-Μ%g X.,օe؈,mQWic!fu Ta@Hrb0AJuӻ|3w1.EG(SּA{ 7,B[봺u > S YZ