Проект httpd-2.4.62-7.el9_7.3.inferit
| Имя | httpd |
|---|---|
| Эпоха | 0 |
| Версия | 2.4.62 |
| Релиз | 7.el9_7.3.inferit |
| Сайт | https://httpd.apache.org/ |
| Лицензия | ASL 2.0 |
| Время сборки | 2025-12-23 10:26:15 |
| Хост сборки | builder-x86-03.inferitos.ru |
| Краткое описание | Apache HTTP Server |
| Репозитории | AppStream |
| Полное описание | The Apache HTTP Server is a powerful, efficient, and extensible web server. |
| Эррата | — |
×
Найдены 2 старые версии
| Пакет | Краткое описание | Контрольная сумма SHA-256 |
|---|---|---|
| x86_64 | ||
| httpd-2.4.62-7.el9_7.3.inferit.x86_64 | Apache HTTP Server | 888e97a30f2d1f92ff3af8e3c8b9d83ac781c8a5f0285f501655fbfcf81eace6 |
| httpd-core-2.4.62-7.el9_7.3.inferit.x86_64 | httpd minimal core | 21329878675f14c98e1ae37eb094ed40f439ab0cd4bbda3e1aca8357e871ebe0 |
| httpd-devel-2.4.62-7.el9_7.3.inferit.x86_64 | Development interfaces for the Apache HTTP Server | 2736981ec086a0e815a262bef3f3d4d24c1be798486a5ae4ee8e8103e0eea210 |
| httpd-tools-2.4.62-7.el9_7.3.inferit.x86_64 | Tools for use with the Apache HTTP Server | aba1b335af1a3c2f4c49c26a8ebfa5e545daa70022fa071566e16c078ec10602 |
| mod_ldap-2.4.62-7.el9_7.3.inferit.x86_64 | LDAP authentication modules for the Apache HTTP Server | d8135289e232a874a382ad6f621c500605bc9368b8c47c9534819f264864b09b |
| mod_lua-2.4.62-7.el9_7.3.inferit.x86_64 | Lua scripting support for the Apache HTTP Server | e76cc21aa54b840a918f413c0b82c312edd5977d6e3f04b204d430ca784c7b2f |
| mod_proxy_html-1:2.4.62-7.el9_7.3.inferit.x86_64 | HTML and XML content filters for the Apache HTTP Server | 3208eb71223efea9673233974652e941f015f45e22b7c2a7b6e0477dfc5f8663 |
| mod_session-2.4.62-7.el9_7.3.inferit.x86_64 | Session interface for the Apache HTTP Server | 34a41f4d513b022337a4990e09ee04464a399fc497d144619b1d2ac19c1c8d48 |
| mod_ssl-1:2.4.62-7.el9_7.3.inferit.x86_64 | SSL/TLS module for the Apache HTTP Server | 0b0497593d49041c9db71b6488495ee9077cccdf4f7babba220d910f9ea00f78 |
| aarch64 | ||
| httpd-2.4.62-7.el9_7.3.inferit.aarch64 | Apache HTTP Server | ebd65fe938ee3ac40a49aa49ac59c7cea956c2b30f60469538044aef68fb7057 |
| httpd-core-2.4.62-7.el9_7.3.inferit.aarch64 | httpd minimal core | 358007defefef39888b161f47985e659aeebf63588a27221ecf1fcf390ee0803 |
| httpd-devel-2.4.62-7.el9_7.3.inferit.aarch64 | Development interfaces for the Apache HTTP Server | 075b8a117bb7ba369777e67bbbb34bef81f5f470d1fd92001062aa9fb85df6d8 |
| httpd-tools-2.4.62-7.el9_7.3.inferit.aarch64 | Tools for use with the Apache HTTP Server | b4b86fa35551aa3f0034e646bdb0604d8e3c5bbc130419533d16adde5284e766 |
| mod_ldap-2.4.62-7.el9_7.3.inferit.aarch64 | LDAP authentication modules for the Apache HTTP Server | dbf0f4e2b0f3ea39d418d707b3b6f757e68bc155c6017962c3082d5206f099cf |
| mod_lua-2.4.62-7.el9_7.3.inferit.aarch64 | Lua scripting support for the Apache HTTP Server | 6270f32ca9324aa4c06f7ab0603b1ea56aefc73b7fd5c6daaef88bd1fe59a65e |
| mod_proxy_html-1:2.4.62-7.el9_7.3.inferit.aarch64 | HTML and XML content filters for the Apache HTTP Server | 572309e050c331eabb0074aebaaa2d52b6448a9052716036132f9026ccf1eafc |
| mod_session-2.4.62-7.el9_7.3.inferit.aarch64 | Session interface for the Apache HTTP Server | 79ed6f254dc4457ca1ff4c6d869a4b841562f11dbd3dba7e840596757b00b689 |
| mod_ssl-1:2.4.62-7.el9_7.3.inferit.aarch64 | SSL/TLS module for the Apache HTTP Server | 1834cd75d476604ea57e4795aabfc3eea210f3b38ea5802f43483435d5267329 |
| noarch | ||
| httpd-filesystem-2.4.62-7.el9_7.3.inferit.noarch | The basic directory layout for the Apache HTTP Server | df749c002fedc2c3b25fd221448de56149bf23be390c4bbf9bc8def68c88d44f |
| httpd-manual-2.4.62-7.el9_7.3.inferit.noarch | Documentation for the Apache HTTP Server | 6185521f39d6186ab314771e844f63a4fd874d5c7d01947d8e36d3ba756a1fd2 |
| src | ||
| httpd-2.4.62-7.el9_7.3.inferit.src | Apache HTTP Server | fb2ff2eeb8e78173edc6e595a0cc4c71475de17f5ad3bfe09cbabadae311af0b |
* Fri Dec 12 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7.3 - Resolves: RHEL-135063 - httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200) - Resolves: RHEL-135048 - httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082) - Resolves: RHEL-134480 - httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098) * Wed Nov 12 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7.2 - Resolves: RHEL-123850 - mod_proxy_hcheck may stop healthchecks after a child process is reclaimed * Tue Nov 11 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7.1 - Resolves: RHEL-125884 - mod_ssl: allow more fine grained SSL SNI vhost check to avoid unnecessary 421 errors after CVE-2025-23048 fix - mod_ssl: add conf.d/snipolicy.conf to set 'SSLVHostSNIPolicy authonly' default * Sat Aug 16 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-7 - Resolves: RHEL-99815 - stickysession field does not work when specifying it in the query parameter after upgrade to 9.5 - Resolves: RHEL-99953 - httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812) - Resolves: RHEL-99968 - httpd: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048) - Resolves: RHEL-99977 - httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252) * Tue Jul 29 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-6 - Resolves: RHEL-94562 - httpd 2.4.62: mod_proxy_connect prematurely closes connections * Fri Jun 06 2025 Joe Orton <jorton@redhat.com> - 2.4.62-5 - mod_dav: add dav_get_base_path() API - Resolves: RHEL-41069 * Wed Jan 29 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-4 - Resolves: RHEL-66488 - Apache HTTPD no longer parse PHP files with unicode characters in the name * Thu Jan 09 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-3 - Resolves: RHEL-68660 - RewriteRule proxying to UDS (unix domain socket) configured in .htaccess doesn't work on httpd-2.4.62-1 * Thu Sep 12 2024 Joe Orton <jorton@redhat.com> - 2.4.62-2 - mod_ssl: fix loading keys via ENGINE API Resolves: RHEL-36755 * Sat Aug 03 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.62-1 - new version 2.4.62 - Resolves: RHEL-52724 - Regression introduced by CVE-2024-38474 fix