[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Проект httpd-2.4.37-65.module+el8.10.0+811+00fd9dc2.7

Имя httpd
Эпоха 0
Версия 2.4.37
Релиз 65.module+el8.10.0+811+00fd9dc2.7
Сайт https://httpd.apache.org/
Лицензия ASL 2.0
Время сборки 2025-12-23 18:35:47
Хост сборки builder-x86-04.inferitos.ru
Краткое описание Apache HTTP Server
Репозитории AppStream
Полное описание The Apache HTTP Server is a powerful, efficient, and extensible web server.
Эррата
Module httpd-2.4-8100020251223150026.acbbbf20
× Full screenshot
Найдено 8 старых версий
Пакеты link
Пакет Краткое описание Контрольная сумма SHA-256
x86_64
httpd-2.4.37-65.module+el8.10.0+811+00fd9dc2.7.x86_64 Apache HTTP Server cc4d69f1750f4dce2a95758584f824213ba9852c4f1d5e772e68cc7581c4a08c download
httpd-devel-2.4.37-65.module+el8.10.0+811+00fd9dc2.7.x86_64 Development interfaces for the Apache HTTP server ce63afc79bf2af48027577323d8490b3d6175029f52875bbb52d5d0c9a0d45f5 download
httpd-tools-2.4.37-65.module+el8.10.0+811+00fd9dc2.7.x86_64 Tools for use with the Apache HTTP Server 6e21ecbb2d194dfc012b87adccd955a893197c701271aedb9ca4e16e3a88eb4a download
mod_ldap-2.4.37-65.module+el8.10.0+811+00fd9dc2.7.x86_64 LDAP authentication modules for the Apache HTTP Server 0eb1bd1c4af59673333a0a616a2fa22f3b27a5a82532521aa2491adc367973d4 download
mod_proxy_html-1:2.4.37-65.module+el8.10.0+811+00fd9dc2.7.x86_64 HTML and XML content filters for the Apache HTTP Server bbe78a3f545a496f9f7ac5bd1dc35148d6f7ca73beb23013f307e4089b10f875 download
mod_session-2.4.37-65.module+el8.10.0+811+00fd9dc2.7.x86_64 Session interface for the Apache HTTP Server 8dfa2f4131fff70713456c0fbac4cf22d1e0f29d4c7f5f734e7a8b7ec5936206 download
mod_ssl-1:2.4.37-65.module+el8.10.0+811+00fd9dc2.7.x86_64 SSL/TLS module for the Apache HTTP Server 51a6c301aec383f2f08f04538ddb061fdd62fd68431b8279215ee5164565afd9 download
noarch
httpd-filesystem-2.4.37-65.module+el8.10.0+811+00fd9dc2.7.noarch The basic directory layout for the Apache HTTP server 5500e2a5fcff3b3e4eec523357469c7c120c231955fb62975d8cc65a32db4711 download
httpd-manual-2.4.37-65.module+el8.10.0+811+00fd9dc2.7.noarch Documentation for the Apache HTTP server e547d94bf9c89d3319a78d7a89978ed5a869bc089a140d0d631a1a632cbc3274 download
src
httpd-2.4.37-65.module+el8.10.0+811+00fd9dc2.7.src Apache HTTP Server e24a1be6f62f6f8ada6d4db5cb71f2027601b1609a89388d783020aef0e51e0f download
История изменений link
* Fri Dec 12 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.7
- Resolves: RHEL-135054 - httpd: Apache HTTP Server: mod_userdir+suexec bypass
  via AllowOverride FileInfo (CVE-2025-66200)
- Resolves: RHEL-135039 - httpd: Apache HTTP Server: CGI environment variable
  override (CVE-2025-65082)
- Resolves: RHEL-134471 - httpd: Apache HTTP Server: Server Side Includes adds
  query string to #exec cmd=... (CVE-2025-58098)

* Fri Nov 07 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.6
- Resolves: RHEL-127073 - mod_ssl: allow more fine grained SSL SNI vhost check
  to avoid unnecessary 421 errors after CVE-2025-23048 fix
- mod_ssl: add conf.d/snipolicy.conf to set 'SSLVHostSNIPolicy authonly' default

* Mon Jul 28 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.5
- Resolves: RHEL-99944 - CVE-2025-49812 httpd: HTTP Session Hijack via a TLS upgrade
- Resolves: RHEL-99969 - CVE-2024-47252 httpd: insufficient escaping of
  user-supplied data in mod_ssl
- Resolves: RHEL-99961 - CVE-2025-23048 httpd: access control bypass by trusted
  clients is possible using TLS 1.3 session resumption

* Tue Apr 22 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.4
- Resolves: RHEL-87641 - apache Bug 63192 - mod_ratelimit breaks HEAD requests

* Wed Jan 29 2025 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.3
- Resolves: RHEL-56068 - Apache HTTPD no longer parse PHP files with
  unicode characters in the name

* Tue Aug 06 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.2
- Resolves: RHEL-46040 - httpd:2.4/httpd: Security issues via backend
  applications whose response headers are malicious or exploitable (CVE-2024-38476)
- Resolves: RHEL-53022 - Regression introduced by CVE-2024-38474 fix

* Thu Jul 11 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65.1
- Resolves: RHEL-45812 - httpd:2.4/httpd: Substitution encoding issue
  in mod_rewrite (CVE-2024-38474)
- Resolves: RHEL-45785 - httpd:2.4/httpd: Encoding problem in
  mod_proxy (CVE-2024-38473)
- Resolves: RHEL-45777 - httpd:2.4/httpd: Improper escaping of output
  in mod_rewrite (CVE-2024-38475)
- Resolves: RHEL-45758 - httpd:2.4/httpd: null pointer dereference
  in mod_proxy (CVE-2024-38477)
- Resolves: RHEL-45743 - httpd:2.4/httpd: Potential SSRF
  in mod_rewrite (CVE-2024-39573)

* Wed Jun 12 2024 Luboš Uhliarik <luhliari@redhat.com> - 2.4.37-65
- Resolves: RHEL-31857 - httpd:2.4/httpd: HTTP response
  splitting (CVE-2023-38709)

* Fri Feb 16 2024 Joe Orton <jorton@redhat.com> - 2.4.37-64
- Resolves: RHEL-14448 - httpd: mod_macro: out-of-bounds read
  vulnerability (CVE-2023-31122)

* Wed Feb 14 2024 Joe Orton <jorton@redhat.com> - 2.4.37-63
- mod_xml2enc: fix media type handling
  Resolves: RHEL-14321