[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Проект httpd-2.4.37-65.module+el8.10.0+798+a496b430.6

Имя httpd
Эпоха 0
Версия 2.4.37
Релиз 65.module+el8.10.0+798+a496b430.6
Сайт https://httpd.apache.org/
Лицензия ASL 2.0
Время сборки 2025-12-19 15:04:33
Хост сборки builder-x86-04.inferitos.ru
Краткое описание Apache HTTP Server
Репозитории AppStream
Полное описание The Apache HTTP Server is a powerful, efficient, and extensible web server.
Эррата
Module httpd-2.4-8100020251219113612.acbbbf20
× Full screenshot
Пакеты link
Пакет Краткое описание Контрольная сумма SHA-256
x86_64
httpd-2.4.37-65.module+el8.10.0+798+a496b430.6.x86_64 Apache HTTP Server 6e4ff6f2b4e5346365834d10b133ee856f06571c196800e760e13500e4d0bb84 download
httpd-devel-2.4.37-65.module+el8.10.0+798+a496b430.6.x86_64 Development interfaces for the Apache HTTP server 087565e04c64ec770aee59d59863d6390cfdae9d1b959e1a8b99976d0e9b938b download
httpd-tools-2.4.37-65.module+el8.10.0+798+a496b430.6.x86_64 Tools for use with the Apache HTTP Server 7d3669cac3bbb73e11faa0bd128b1125dfa197052afd9a81cdeda20ccc9ef025 download
mod_ldap-2.4.37-65.module+el8.10.0+798+a496b430.6.x86_64 LDAP authentication modules for the Apache HTTP Server c43d8831257627c3ee19195742bd9bd896071cdd17ebec610f234c20498a1a23 download
mod_proxy_html-1:2.4.37-65.module+el8.10.0+798+a496b430.6.x86_64 HTML and XML content filters for the Apache HTTP Server b32d91fd4a03b5ed4f70d02ea6bce838d6a18f0bf6afb7e9d25ae193f1761c76 download
mod_session-2.4.37-65.module+el8.10.0+798+a496b430.6.x86_64 Session interface for the Apache HTTP Server e8cd62a5d895c9500845fb9781fef0f7887b4bf2ee44f41e8b5d6ec15dd92411 download
mod_ssl-1:2.4.37-65.module+el8.10.0+798+a496b430.6.x86_64 SSL/TLS module for the Apache HTTP Server caf4736878cd791204c255f974ed1123631af5509ae6340460f82bb00ddcb787 download
noarch
httpd-filesystem-2.4.37-65.module+el8.10.0+798+a496b430.6.noarch The basic directory layout for the Apache HTTP server 733e74438f413fad05d97bb320dee9bd4c56cf659c980c3725fe92240a22dff8 download
httpd-manual-2.4.37-65.module+el8.10.0+798+a496b430.6.noarch Documentation for the Apache HTTP server 5725927f8d7415773d9e8175c397c008cef82bb89e8934accd8325db2cfef617 download
src
httpd-2.4.37-65.module+el8.10.0+798+a496b430.6.src Apache HTTP Server 98cc73b72e8f0a7e0d028198eabc04215ac6c63927e2e9e7ed13e91a53acef76 download
История изменений link
* Fri Nov 07 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.6
- Resolves: RHEL-127073 - mod_ssl: allow more fine grained SSL SNI vhost check
  to avoid unnecessary 421 errors after CVE-2025-23048 fix
- mod_ssl: add conf.d/snipolicy.conf to set 'SSLVHostSNIPolicy authonly' default

* Mon Jul 28 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.5
- Resolves: RHEL-99944 - CVE-2025-49812 httpd: HTTP Session Hijack via a TLS upgrade
- Resolves: RHEL-99969 - CVE-2024-47252 httpd: insufficient escaping of
  user-supplied data in mod_ssl
- Resolves: RHEL-99961 - CVE-2025-23048 httpd: access control bypass by trusted
  clients is possible using TLS 1.3 session resumption

* Tue Apr 22 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.4
- Resolves: RHEL-87641 - apache Bug 63192 - mod_ratelimit breaks HEAD requests

* Wed Jan 29 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.3
- Resolves: RHEL-56068 - Apache HTTPD no longer parse PHP files with
  unicode characters in the name

* Tue Aug 06 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.2
- Resolves: RHEL-46040 - httpd:2.4/httpd: Security issues via backend
  applications whose response headers are malicious or exploitable (CVE-2024-38476)
- Resolves: RHEL-53022 - Regression introduced by CVE-2024-38474 fix

* Thu Jul 11 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.1
- Resolves: RHEL-45812 - httpd:2.4/httpd: Substitution encoding issue
  in mod_rewrite (CVE-2024-38474)
- Resolves: RHEL-45785 - httpd:2.4/httpd: Encoding problem in
  mod_proxy (CVE-2024-38473)
- Resolves: RHEL-45777 - httpd:2.4/httpd: Improper escaping of output
  in mod_rewrite (CVE-2024-38475)
- Resolves: RHEL-45758 - httpd:2.4/httpd: null pointer dereference
  in mod_proxy (CVE-2024-38477)
- Resolves: RHEL-45743 - httpd:2.4/httpd: Potential SSRF
  in mod_rewrite (CVE-2024-39573)

* Wed Jun 12 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65
- Resolves: RHEL-31857 - httpd:2.4/httpd: HTTP response
  splitting (CVE-2023-38709)

* Fri Feb 16 2024 Joe Orton <jorton@redhat.com> - 2.4.37-64
- Resolves: RHEL-14448 - httpd: mod_macro: out-of-bounds read
  vulnerability (CVE-2023-31122)

* Wed Feb 14 2024 Joe Orton <jorton@redhat.com> - 2.4.37-63
- mod_xml2enc: fix media type handling
  Resolves: RHEL-14321

* Sun Dec 10 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 2.4.37-62
- Rebuilt for MSVSphere 8.8