Пакет mod_proxy_html-1:2.4.37-65.module+el8.10.0+798+a496b430.6.x86_64
| Имя | mod_proxy_html |
|---|---|
| Эпоха | 1 |
| Версия | 2.4.37 |
| Релиз | 65.module+el8.10.0+798+a496b430.6 |
| Архитектура | x86_64 |
| Сайт | https://httpd.apache.org/ |
| Лицензия | ASL 2.0 |
| Время сборки | 2025-12-19 15:10:31 |
| Хост сборки | builder-x86-05.inferitos.ru |
| Краткое описание | HTML and XML content filters for the Apache HTTP Server |
| Репозитории | AppStream |
| Полное описание | The mod_proxy_html and mod_xml2enc modules provide filters which can transform and modify HTML and XML content. |
| Эррата | — |
| Размер | 68 КиБ |
| Исходный проект | httpd-2.4.37-65.module+el8.10.0+798+a496b430.6 |
| Контрольная сумма SHA-256 | b32d91fd4a03b5ed4f70d02ea6bce838d6a18f0bf6afb7e9d25ae193f1761c76 |
| Module | httpd-2.4-8100020251219113612.acbbbf20 |
×
* Fri Nov 07 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.6 - Resolves: RHEL-127073 - mod_ssl: allow more fine grained SSL SNI vhost check to avoid unnecessary 421 errors after CVE-2025-23048 fix - mod_ssl: add conf.d/snipolicy.conf to set 'SSLVHostSNIPolicy authonly' default * Mon Jul 28 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.5 - Resolves: RHEL-99944 - CVE-2025-49812 httpd: HTTP Session Hijack via a TLS upgrade - Resolves: RHEL-99969 - CVE-2024-47252 httpd: insufficient escaping of user-supplied data in mod_ssl - Resolves: RHEL-99961 - CVE-2025-23048 httpd: access control bypass by trusted clients is possible using TLS 1.3 session resumption * Tue Apr 22 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.4 - Resolves: RHEL-87641 - apache Bug 63192 - mod_ratelimit breaks HEAD requests * Wed Jan 29 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.3 - Resolves: RHEL-56068 - Apache HTTPD no longer parse PHP files with unicode characters in the name * Tue Aug 06 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.2 - Resolves: RHEL-46040 - httpd:2.4/httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476) - Resolves: RHEL-53022 - Regression introduced by CVE-2024-38474 fix * Thu Jul 11 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.1 - Resolves: RHEL-45812 - httpd:2.4/httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474) - Resolves: RHEL-45785 - httpd:2.4/httpd: Encoding problem in mod_proxy (CVE-2024-38473) - Resolves: RHEL-45777 - httpd:2.4/httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475) - Resolves: RHEL-45758 - httpd:2.4/httpd: null pointer dereference in mod_proxy (CVE-2024-38477) - Resolves: RHEL-45743 - httpd:2.4/httpd: Potential SSRF in mod_rewrite (CVE-2024-39573) * Wed Jun 12 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65 - Resolves: RHEL-31857 - httpd:2.4/httpd: HTTP response splitting (CVE-2023-38709) * Fri Feb 16 2024 Joe Orton <jorton@redhat.com> - 2.4.37-64 - Resolves: RHEL-14448 - httpd: mod_macro: out-of-bounds read vulnerability (CVE-2023-31122) * Wed Feb 14 2024 Joe Orton <jorton@redhat.com> - 2.4.37-63 - mod_xml2enc: fix media type handling Resolves: RHEL-14321 * Sun Dec 10 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 2.4.37-62 - Rebuilt for MSVSphere 8.8