httpd-filesystem-2.4.51-22.oe2203sp40>    f:# ;G|`u` 9 Z&21R(r0X'U?Wua.8c"quCVX 6N4fSyzcQkyJ LR/m0o_;!4Oo92b96f12fc844567b9778d925f593a7dd77fefca01f96fdad70d084cc788b5cea8e9bc1f3f32f92de95dc3aafe7e4d9be5deeb1c9uA :)ccK><?d ' K     N Tl(89:=FGHIXY\]^Mbdefltuvz`dChttpd-filesystem2.4.5122.oe2203sp4The basic directory for HTTP ServerThis package contains the basic directory layout for HTTP Server.f9dc-64g.compass-cinASL 2.0http://openeuler.orgUnspecifiedhttps://httpd.apache.org/linuxnoarchgetent group apache >/dev/null || groupadd -g 48 -r apache getent passwd apache >/dev/null || \ useradd -r -u 48 -g apache -s /sbin/nologin \ -d /usr/share/httpd -c "Apache" apache exit 0nAAAAAf:f:f:f:f:f:8935e31406a11aa4a20a2b92782639f9f4eec8882d1ad1503c9cb27a2e9677ecrootrootrootrootrootrootrootrootrootrootrootroothttpd-2.4.51-22.oe2203sp4.src.rpmhttpd-filesystem    /bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shadow-utils3.0.4-14.6.0-14.0-15.2-14.17.0f1f:eDeDddm@d9@@d d @cۥcFccb@chengyechun - 2.4.51-22chengyechun - 2.4.51-21chengyechun - 2.4.51-20chengyechun - 2.4.51-19panchenbo - 2.4.51-18chengyechun - 2.4.51-17chengyechun - 2.4.51-16chengyechun - 2.4.51-15chengyechun - 2.4.51-14seuzw <930zhaowei@163.com> - 2.4.51-13chengyechun - 2.4.51-12chengyechun - 2.4.51-11chengyechun - 2.4.51-10chengyechun - 2.4.51-9- Type:CVE - ID:CVE-2024-38473,CVE-2024-38474,CVE-2024-38475,CVE-2024-38476,CVE-2024-38477,CVE-2024-39884,CVE-2024-39573 - SUG:NA - DSEC:fix some CVEs- Type:CVE - ID:CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 - SUG:NA - DESC:fix CVE-2024-24795,CVE-2023-38709,CVE-2024-27316 and sync some patches from upstream- Type:CVE - ID:CVE-2023-45802 - SUG:NA - DESC:fix CVE-2023-45802- Type:CVE - ID:CVE-2023-31122 - SUG:NA - DESC:fix CVE-2023-31122- Type:bugfix - ID: - SUG:NA - DESC:add sw_64 support,optimize sw build patch,add loongarch64 support- Type:bugfix - ID: - SUG:restart - DESC:Fix double encoding of the uri-path of the request Do not match the extention against possible query string Do not double encode slashes Check before forwarding that a nocanon path has not been rewriteen- Type:bugfix - ID: - SUG:restart - DESC:Report an error if the AJP backend sends an invalid number of headers handled a negative value when parsing the config avoid delimiting the query with a backreference fix missing APLOGNO- Type:CVE - ID:CVE-2023-27522, CVE-2023-25690 - SUG:restart - DESC:fix CVE-2023-27522, CVE-2023-25690- Type:bugfix - ID:NA - SUG:restart - DESC:mod_dav:open the lock database read-only when possible- Type:cves - ID:CVE-2022-36760,CVE-2006-20001,CVE-2022-37436 - SUG:restart - DESC:fix CVE-2022-36760,CVE-2006-20001,CVE-2022-37436- Type:bugfix - ID: - SUG:restart - DESC:reduce the dependency of httpd on system-logos installation- Type:bugfix - ID: - SUG:restart - DESC:change default value of HeartbeatMaxServers fix setting and comparison of IPs fileds avoid voerflow in case of indecently large session make ap_escape_quotes() work correctly fix lua_request with cast first Handle children killed pathologically mod_md do not interfere with requests if challenge type http-01- Type:bugfix - ID: - SUG:restart - DESC:fix the name of the CVE patch- Type:CVE - ID:CVE-2022-28330 - SUG:restart - DESC:fix CVE-2022-28330/bin/shdc-64g.compass-ci 17205314262.4.51-22.oe2203sp4READMEhttpd.service.dhttpd.socket.diconscgi-binhtml/etc/httpd/conf.d//usr/lib/systemd/system//usr/share/httpd//var/www/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection cpioxz2x86_64-openEuler-linux-gnuASCII textdirectory=R{6ۃf%utf-8e5e9631aa201e7acbe8fc790e5051e36fde9ffdb46f90d610f0db5d4150dbc5de14125a95153e67e275e360332f0bd73583a2ab3f547e94b7d1b75b1582111d3?@7zXZ !#,+] b2u Q{LY7A%.Be-@[Ie۲ #,D0*|'@*_q1m>96R5c\:goMO_*-}5[rm?ZgZ{2]u7m+eYKmp 'yW >TckS1 ; mgst^5B`Y@%=w6x