Пакет httpd-devel-2.4.62-7.el9_7.3.inferit.aarch64
| Имя | httpd-devel |
|---|---|
| Эпоха | 0 |
| Версия | 2.4.62 |
| Релиз | 7.el9_7.3.inferit |
| Архитектура | aarch64 |
| Сайт | https://httpd.apache.org/ |
| Лицензия | ASL 2.0 |
| Время сборки | 2025-12-23 10:26:40 |
| Хост сборки | builder-arm64-1.inferitos.ru |
| Краткое описание | Development interfaces for the Apache HTTP Server |
| Репозитории | AppStream |
| Полное описание | The httpd-devel package contains the APXS binary and other files that you need to build Dynamic Shared Objects (DSOs) for the Apache HTTP Server. If you are installing the Apache HTTP Server and you want to be able to compile or develop additional modules for Apache, you need to install this package. |
| Эррата | — |
| Размер | 211 КиБ |
| Исходный проект | httpd-2.4.62-7.el9_7.3.inferit |
| Контрольная сумма SHA-256 | 075b8a117bb7ba369777e67bbbb34bef81f5f470d1fd92001062aa9fb85df6d8 |
×
* Fri Dec 12 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7.3 - Resolves: RHEL-135063 - httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200) - Resolves: RHEL-135048 - httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082) - Resolves: RHEL-134480 - httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098) * Wed Nov 12 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7.2 - Resolves: RHEL-123850 - mod_proxy_hcheck may stop healthchecks after a child process is reclaimed * Tue Nov 11 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7.1 - Resolves: RHEL-125884 - mod_ssl: allow more fine grained SSL SNI vhost check to avoid unnecessary 421 errors after CVE-2025-23048 fix - mod_ssl: add conf.d/snipolicy.conf to set 'SSLVHostSNIPolicy authonly' default * Sat Aug 16 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7 - Resolves: RHEL-99815 - stickysession field does not work when specifying it in the query parameter after upgrade to 9.5 - Resolves: RHEL-99953 - httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812) - Resolves: RHEL-99968 - httpd: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048) - Resolves: RHEL-99977 - httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252) * Tue Jul 29 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-6 - Resolves: RHEL-94562 - httpd 2.4.62: mod_proxy_connect prematurely closes connections * Fri Jun 06 2025 Joe Orton <jorton@redhat.com> - 2.4.62-5 - mod_dav: add dav_get_base_path() API - Resolves: RHEL-41069 * Wed Jan 29 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-4 - Resolves: RHEL-66488 - Apache HTTPD no longer parse PHP files with unicode characters in the name * Thu Jan 09 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-3 - Resolves: RHEL-68660 - RewriteRule proxying to UDS (unix domain socket) configured in .htaccess doesn't work on httpd-2.4.62-1 * Thu Sep 12 2024 Joe Orton <jorton@redhat.com> - 2.4.62-2 - mod_ssl: fix loading keys via ENGINE API Resolves: RHEL-36755 * Sat Aug 03 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-1 - new version 2.4.62 - Resolves: RHEL-52724 - Regression introduced by CVE-2024-38474 fix