httpd-filesystem-2.4.51-20.oe2203 >  A eKW^^fWd!= & ] tM6@@"=Mb}Rz/rX-1hʺ^@WnlG]n넹V]ۜEaUo3s_ ""Y^^#DZU'D;~w͵Rb"<BDDJr9q?Tb/0?n9@FlƲCUdTC@0^Iǜb>N=5GlIiPsy<富S 13a5f714471a78f66b28948f2fce3975ef081b22ab6dce1f749ac4559ed5be8b1f885446306793e21e7980563cc9041561c93a0eueKW^^f7;F΁1 `uڧ!}3 =zPaYx v.Vy[5wb$ =oOS~.88kp ֒OX4|(r+t:^GzyB*۟/F~ nގ kߜWj:L3X!cF !Yx/ 0ֿ'jm6=c^v61]+jF#*\~ 9UQJΐr6 {r`VB䁛m5'd٬,p20U&^jd,>p??yd $ H      $ j p((89:=FG<HTIlXtYx\]^b%cdjeofrlttuvz48Chttpd-filesystem2.4.5120.oe2203The basic directory for HTTP ServerThis package contains the basic directory layout for HTTP Server.eBobs-worker-010nHuawei openEulerhttp://openeuler.orgASL 2.0http://openeuler.orgUnspecifiedhttps://httpd.apache.org/linuxnoarchgetent group apache >/dev/null || groupadd -g 48 -r apache getent passwd apache >/dev/null || \ useradd -r -u 48 -g apache -s /sbin/nologin \ -d /usr/share/httpd -c "Apache" apache exit 0nAAAAAeBeBeBeBeBeB8935e31406a11aa4a20a2b92782639f9f4eec8882d1ad1503c9cb27a2e9677ecrootrootrootrootrootrootrootrootrootrootrootroothttpd-2.4.51-20.oe2203.src.rpmhttpd-filesystem    /bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shadow-utils3.0.4-14.6.0-14.0-15.2-14.17.0eC@e?d@d,@d9@@d @dccױ@ccMCb@b@blbb4t@b3"aa+@aA@chengyechun - 2.4.51-20chengyechun - 2.4.51-19chengyechun - 2.4.51-18zhanghao - 2.4.51-17chengyechun - 2.4.51-16chengyechun - 2.4.51-15chengyechun - 2.4.51-14Wenlong Zhang - 2.4.51-13chengyechun - 2.4.51-12chengyechun - 2.4.51-11chengyechun - 2.4.51-10chengyechun - 2.4.51-9chengyechun - 2.4.51-8chengyechun - 2.4.51-7chengyechun - 2.4.51-6gaihuiying - 2.4.51-5gaihuiying - 2.4.51-4quanhongfei - 2.4.51-3gaihuiying - 2.4.51-2yanglu - 2.4.51-1- Type:CVE - ID:CVE-2023-45802 - SUG:NA - DESC:fix CVE-2023-45802- Type:CVE - ID:CVE-2023-31122 - SUG:NA - DESC:fix CVE-2023-31122 mod_macro buffer over-read- Type:bugfix - ID:NA - SUG:NA - DESC:fix memory leak in calc_sha256_hash- Type:bugfix - ID: - SUG:restart - DESC:Fix double encoding of the uri-path of the request Do not match the extention against possible query string Do not double encode slashes Check before forwarding that a nocanon path has not been rewriteen- Type:bugfix - ID: - SUG:restart - DESC:Report an error if the AJP backend sends an invalid number of headers handled a negative value when parsing the config avoid delimiting the query with a backreference fix missing APLOGNO- Type:CVE - ID:CVE-2023-27522, CVE-2023-25690 - SUG:restart - DESC:fix CVE-2023-27522, CVE-2023-25690- Type:bugfix - ID:NA - SUG:restart - DESC:mod_dav:open the lock database read-only when possible- Type:bugfix - ID:NA - SUG:restart - DESC:fix build error for loongarch64- Type:CVE - ID:CVE-2022-36760, CVE-2006-20001, CVE-2022-37436 - SUG:restart - DESC:fix CVE-2022-36760,CVE-2006-20001,CVE-2022-37436- Type:bugfix - ID:NA - SUG:restart - DESC:fix the name of the CVE patch- Type:bugfix - ID:NA - SUG:restart - DESC:change default value of HeartbeatMaxServers fix setting and comparison of IPs fileds avoid voerflow in case of indecently large session make ap_escape_quotes() work correctly fix lua_request with cast first Handle children killed pathologically mod_md do not interfere with requests if challenge type http-01- Type:CVE - ID:CVE-2022-28330 - SUG:restart - DESC:fix CVE-2022-28330- Type:CVE - ID:NA - SUG:restart - DESC:fix CVE-2022-31813,CVE-2022-28614,CVE-2022-29404,CVE-2022-26377,CVE-2022-30522,CVE-2022-30556- Type:CVE - ID:NA - SUG:restart - DESC:fix CVE-2022-28615- Type:bugfix - ID:NA - SUG:restart - DESC:switch from PCRE to PCRE2- Type:cves - ID:NA - SUG:restart - DESC:fix CVE-2021-44790 CVE-2021-44224- Type:cves - ID:NA - SUG:restart - DESC:fix CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 CVE-2022-23934- Type:bugfix - ID:NA - SUG:restart - DESC:fix mod info in configuration- Type:bugfix - ID:NA - SUG:NA - DESC:fix build error of "SSL_PROTOCAL_SSLV3 undeclared"- Type:requirement - ID:NA - SUG:NA - DESC:update httpd to 2.4.51/bin/shobs-worker-010 16988832002.4.51-20.oe2203READMEhttpd.service.dhttpd.socket.diconscgi-binhtml/etc/httpd/conf.d//usr/lib/systemd/system//usr/share/httpd//var/www/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03:LTS/standard_aarch64/256652236a3ab0e0754e544869f1608a-httpdcpioxz2aarch64-openEuler-linux-gnuASCII textdirectory ¬?T|futf-85ceaf806a14b911663784cc3d4105481293c612a3914104834b8d56104e0ad16bb460023a837281b71d5458245653f38230c654c95c7042a31352b66681484b6?7zXZ !#,+] b2u Q{LWD],w әrn%;zaǺ!`h{;֭9c%xΒ^FdCОYT]F_W%kA4ƤGGy?ENFϤNH8tg)c8ŔRc]-FJf*1Ӯ:qmLйJ/W *gU d6OOm7Yk=ܷQE-x"~ܝa{2 !n&+˦ƛN"㍦ @shQ/C4@aǰ+|߀Z`Qb yuX?lsKxܚܶ8 x#N9\lidk؄뉱'F#7(qEEe?8# eL*15+fh pnI YZ