httpd-filesystem-2.4.51-23.oe2203sp40>    gF ;G|`u` Y O>졁 A;r}B`n&ULn{ ω34q^ͳ`6 W}JHe=- %#vi}r@rd'E1択po/8pY$cUjP@+ n` ڝ&*Z,')rs3'~EڢAnsuyS*d,zp g K" J0]> <?d ' K     N Tl(89:=FGHIXY\]^Ibd|efltuvzHLChttpd-filesystem2.4.5123.oe2203sp4The basic directory for HTTP ServerThis package contains the basic directory layout for HTTP Server.g7dc-64g.compass-cinASL 2.0http://openeuler.orgUnspecifiedhttps://httpd.apache.org/linuxnoarchgetent group apache >/dev/null || groupadd -g 48 -r apache getent passwd apache >/dev/null || \ useradd -r -u 48 -g apache -s /sbin/nologin \ -d /usr/share/httpd -c "Apache" apache exit 0nAAAAAg"g"g"g&g&g&8935e31406a11aa4a20a2b92782639f9f4eec8882d1ad1503c9cb27a2e9677ecrootrootrootrootrootrootrootrootrootrootrootroothttpd-2.4.51-23.oe2203sp4.src.rpmhttpd-filesystem    /bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shadow-utils3.0.4-14.6.0-14.0-15.2-14.17.0f@f1f:eDeDddm@d9@@d d @cۥcFccHan Jinpeng - 2.4.51-23chengyechun - 2.4.51-22chengyechun - 2.4.51-21chengyechun - 2.4.51-20chengyechun - 2.4.51-19panchenbo - 2.4.51-18chengyechun - 2.4.51-17chengyechun - 2.4.51-16chengyechun - 2.4.51-15chengyechun - 2.4.51-14seuzw <930zhaowei@163.com> - 2.4.51-13chengyechun - 2.4.51-12chengyechun - 2.4.51-11chengyechun - 2.4.51-10- Type:CVE - ID:CVE-2024-40725 - SUG:NA - DESC:fix CVE-2024-40725- Type:CVE - ID:CVE-2024-38473,CVE-2024-38474,CVE-2024-38475,CVE-2024-38476,CVE-2024-38477,CVE-2024-39884,CVE-2024-39573 - SUG:NA - DSEC:fix some CVEs- Type:CVE - ID:CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 - SUG:NA - DESC:fix CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 and sync some patches from upstream- Type:CVE - ID:CVE-2023-45802 - SUG:NA - DESC:fix CVE-2023-45802- Type:CVE - ID:CVE-2023-31122 - SUG:NA - DESC:fix CVE-2023-31122- Type:bugfix - ID: - SUG:NA - DESC:add sw_64 support,optimize sw build patch,add loongarch64 support- Type:bugfix - ID: - SUG:restart - DESC:Fix double encoding of the uri-path of the request Do not match the extention against possible query string Do not double encode slashes Check before forwarding that a nocanon path has not been rewriteen- Type:bugfix - ID: - SUG:restart - DESC:Report an error if the AJP backend sends an invalid number of headers handled a negative value when parsing the config avoid delimiting the query with a backreference fix missing APLOGNO- Type:CVE - ID:CVE-2023-27522, CVE-2023-25690 - SUG:restart - DESC:fix CVE-2023-27522, CVE-2023-25690- Type:bugfix - ID:NA - SUG:restart - DESC:mod_dav:open the lock database read-only when possible- Type:cves - ID:CVE-2022-36760,CVE-2006-20001,CVE-2022-37436 - SUG:restart - DESC:fix CVE-2022-36760,CVE-2006-20001,CVE-2022-37436- Type:bugfix - ID: - SUG:restart - DESC:reduce the dependency of httpd on system-logos installation- Type:bugfix - ID: - SUG:restart - DESC:change default value of HeartbeatMaxServers fix setting and comparison of IPs fileds avoid voerflow in case of indecently large session make ap_escape_quotes() work correctly fix lua_request with cast first Handle children killed pathologically mod_md do not interfere with requests if challenge type http-01- Type:bugfix - ID: - SUG:restart - DESC:fix the name of the CVE patch/bin/shdc-64g.compass-ci 17296010792.4.51-23.oe2203sp4READMEhttpd.service.dhttpd.socket.diconscgi-binhtml/etc/httpd/conf.d//usr/lib/systemd/system//usr/share/httpd//var/www/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-openEuler-linux-gnuASCII textdirectoryg:~裡utf-8241983144dca2b34cbefa0d787fbdcea0e0ead6bbcdabe1b1312c9ecd21515808487cb1a2ada2fcdbc089f60633b6f8db322f0883b589d19cabf6db3c85d77ca?@7zXZ !#,+] b2u Q{LZ':@?aW=Đfӭҵlō5x;BE[]&y1_B3̪Eau.+dt8O+919aSҢ%5^ɟᑔ@%*ynsԷ/G ԂV:Gn Q(ƪ(v1dͳQ׍\J%}AA49OIUĹtdi&4G6*1˦, i0^R'iDtj~m nA^CLr]34Jm~l0DJkG:{qs>tXVdlcaU 7 /]צ[yR8, */ͼ`c;o";Xʿm]w 8 YZ