Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2012:0714 - Bug Fix Advisory
Issued:
2012-06-06
Updated:
2012-06-06

RHBA-2012:0714 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

httpd bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

Description

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and
extensible web server.

This update fixes the following bug:

  • Due to a bug in the "mod_cache" module, an unexpected "304 Not Modified" HTTP

response could be incorrectly returned to the client on non-conditional HTTP GET
requests. With this update, the "mod_cache" module has been modified to
correctly handle 304 responses, which are not returned in this scenario.
(BZ#825675)

All users of httpd are advised to upgrade to these updated packages, which fix
this bug.

Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

(none)

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
httpd-2.2.3-65.el5_8.src.rpm SHA-256: bfe794d4a74bcb844fa03ccab168718226faa8b5a4bdd8ac45452ff2fd8e3f17
x86_64
httpd-2.2.3-65.el5_8.x86_64.rpm SHA-256: 4992dfa4ee2b508cf836e1ce8eb3aff46eb701d742867a7fba1210174c8b343f
httpd-debuginfo-2.2.3-65.el5_8.i386.rpm SHA-256: 114c3bba6cf6c08b1361bf15e6524eba349936eab8676bff0c00a39a411ac776
httpd-debuginfo-2.2.3-65.el5_8.x86_64.rpm SHA-256: 8e5381b0b20795a866201c8be1c15ef28f24ba741cc4222e965316afefb03445
httpd-devel-2.2.3-65.el5_8.i386.rpm SHA-256: 8d8400ab165556d475193378a321c7137ff82bda81478652c338fe003cfe190b
httpd-devel-2.2.3-65.el5_8.x86_64.rpm SHA-256: f024ed0d2d2ac757337ba7297564dc3dddc90a355baf7a4c8146b5414b62d449
httpd-manual-2.2.3-65.el5_8.x86_64.rpm SHA-256: 6881c0c71d7a3cf78a9358ecdde5eaeae9502fe6c6cbaebbb04fe85c3a1d839f
mod_ssl-2.2.3-65.el5_8.x86_64.rpm SHA-256: a625a404e50feb0331f54195158accd5d7cd7764394abc201ccacd7deb79d1e1
ia64
httpd-2.2.3-65.el5_8.ia64.rpm SHA-256: f31dbe0de4c944ca1afb1eb04c6a19c1a3af2e81af2e044887c6dd4a08527f10
httpd-debuginfo-2.2.3-65.el5_8.ia64.rpm SHA-256: c4a5fa017c6538541920cd29751e71f65d6872b9c2d2a09cac11ad6a5031bcd3
httpd-devel-2.2.3-65.el5_8.ia64.rpm SHA-256: 917baa6f3eefa05fd88ef4d42f4398224b9d0cd8370fd7aecf91d5d15c07bfec
httpd-manual-2.2.3-65.el5_8.ia64.rpm SHA-256: 03fecdd7f555cfeaa8eb906ebeb85308a24c74f24684ec5d8cc4b958f195cc5b
mod_ssl-2.2.3-65.el5_8.ia64.rpm SHA-256: c3e01bc327aa1e007f590ee9173b35e1621423debd0165e8f1d8ef26d26cf43c
i386
httpd-2.2.3-65.el5_8.i386.rpm SHA-256: b7455031a36b0a0d4ce40084811a65e00d36a1fccb0d7bc45ed90180dbeaed51
httpd-debuginfo-2.2.3-65.el5_8.i386.rpm SHA-256: 114c3bba6cf6c08b1361bf15e6524eba349936eab8676bff0c00a39a411ac776
httpd-devel-2.2.3-65.el5_8.i386.rpm SHA-256: 8d8400ab165556d475193378a321c7137ff82bda81478652c338fe003cfe190b
httpd-manual-2.2.3-65.el5_8.i386.rpm SHA-256: 474c5cbc515db9e87c4d8641d80d9af2f75d511e763f2b903c9950440227f51e
mod_ssl-2.2.3-65.el5_8.i386.rpm SHA-256: f3cc2182ba15863e9f5ac3791feecc076230758f37ec49082c425655c3d03ebd

Red Hat Enterprise Linux Workstation 5

SRPM
httpd-2.2.3-65.el5_8.src.rpm SHA-256: bfe794d4a74bcb844fa03ccab168718226faa8b5a4bdd8ac45452ff2fd8e3f17
x86_64
httpd-2.2.3-65.el5_8.x86_64.rpm SHA-256: 4992dfa4ee2b508cf836e1ce8eb3aff46eb701d742867a7fba1210174c8b343f
httpd-debuginfo-2.2.3-65.el5_8.i386.rpm SHA-256: 114c3bba6cf6c08b1361bf15e6524eba349936eab8676bff0c00a39a411ac776
httpd-debuginfo-2.2.3-65.el5_8.x86_64.rpm SHA-256: 8e5381b0b20795a866201c8be1c15ef28f24ba741cc4222e965316afefb03445
httpd-debuginfo-2.2.3-65.el5_8.x86_64.rpm SHA-256: 8e5381b0b20795a866201c8be1c15ef28f24ba741cc4222e965316afefb03445
httpd-devel-2.2.3-65.el5_8.i386.rpm SHA-256: 8d8400ab165556d475193378a321c7137ff82bda81478652c338fe003cfe190b
httpd-devel-2.2.3-65.el5_8.x86_64.rpm SHA-256: f024ed0d2d2ac757337ba7297564dc3dddc90a355baf7a4c8146b5414b62d449
httpd-manual-2.2.3-65.el5_8.x86_64.rpm SHA-256: 6881c0c71d7a3cf78a9358ecdde5eaeae9502fe6c6cbaebbb04fe85c3a1d839f
mod_ssl-2.2.3-65.el5_8.x86_64.rpm SHA-256: a625a404e50feb0331f54195158accd5d7cd7764394abc201ccacd7deb79d1e1
i386
httpd-2.2.3-65.el5_8.i386.rpm SHA-256: b7455031a36b0a0d4ce40084811a65e00d36a1fccb0d7bc45ed90180dbeaed51
httpd-debuginfo-2.2.3-65.el5_8.i386.rpm SHA-256: 114c3bba6cf6c08b1361bf15e6524eba349936eab8676bff0c00a39a411ac776
httpd-debuginfo-2.2.3-65.el5_8.i386.rpm SHA-256: 114c3bba6cf6c08b1361bf15e6524eba349936eab8676bff0c00a39a411ac776
httpd-devel-2.2.3-65.el5_8.i386.rpm SHA-256: 8d8400ab165556d475193378a321c7137ff82bda81478652c338fe003cfe190b
httpd-manual-2.2.3-65.el5_8.i386.rpm SHA-256: 474c5cbc515db9e87c4d8641d80d9af2f75d511e763f2b903c9950440227f51e
mod_ssl-2.2.3-65.el5_8.i386.rpm SHA-256: f3cc2182ba15863e9f5ac3791feecc076230758f37ec49082c425655c3d03ebd

Red Hat Enterprise Linux Desktop 5

SRPM
httpd-2.2.3-65.el5_8.src.rpm SHA-256: bfe794d4a74bcb844fa03ccab168718226faa8b5a4bdd8ac45452ff2fd8e3f17
x86_64
httpd-2.2.3-65.el5_8.x86_64.rpm SHA-256: 4992dfa4ee2b508cf836e1ce8eb3aff46eb701d742867a7fba1210174c8b343f
httpd-debuginfo-2.2.3-65.el5_8.x86_64.rpm SHA-256: 8e5381b0b20795a866201c8be1c15ef28f24ba741cc4222e965316afefb03445
mod_ssl-2.2.3-65.el5_8.x86_64.rpm SHA-256: a625a404e50feb0331f54195158accd5d7cd7764394abc201ccacd7deb79d1e1
i386
httpd-2.2.3-65.el5_8.i386.rpm SHA-256: b7455031a36b0a0d4ce40084811a65e00d36a1fccb0d7bc45ed90180dbeaed51
httpd-debuginfo-2.2.3-65.el5_8.i386.rpm SHA-256: 114c3bba6cf6c08b1361bf15e6524eba349936eab8676bff0c00a39a411ac776
mod_ssl-2.2.3-65.el5_8.i386.rpm SHA-256: f3cc2182ba15863e9f5ac3791feecc076230758f37ec49082c425655c3d03ebd

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
httpd-2.2.3-65.el5_8.src.rpm SHA-256: bfe794d4a74bcb844fa03ccab168718226faa8b5a4bdd8ac45452ff2fd8e3f17
s390x
httpd-2.2.3-65.el5_8.s390x.rpm SHA-256: 4c4c984edbd4a4a1d4fe8a985ece27d52cd6b931aa8bc93aac81bae19a9a02fd
httpd-debuginfo-2.2.3-65.el5_8.s390.rpm SHA-256: 37ebf4cfd1a5b902e5aea6f72dbbf63e708394abf79c11f3a19e8c21e94aef79
httpd-debuginfo-2.2.3-65.el5_8.s390x.rpm SHA-256: f2b4a65f9c30e11db9db84addf9838d6154cd08a9fe79a7c4546c80c31a397f4
httpd-devel-2.2.3-65.el5_8.s390.rpm SHA-256: 9e4c808d4372eae5e9a7effbdacd3f9b276af319c3a05cf16069b24253b3e2aa
httpd-devel-2.2.3-65.el5_8.s390x.rpm SHA-256: 55f4c0ccbeeb17b3acec24c6e0569f1f5e4215f5965b0951994e83b1677274a1
httpd-manual-2.2.3-65.el5_8.s390x.rpm SHA-256: c6d72d9305113e22d5fedd7e76020e66d7756a0f83a6df8aade8fd7738f6cce9
mod_ssl-2.2.3-65.el5_8.s390x.rpm SHA-256: c33aa2183059864e6479d982cf0a5e3263df6a58da76eac7fd9ff6cc38622587

Red Hat Enterprise Linux for Power, big endian 5

SRPM
httpd-2.2.3-65.el5_8.src.rpm SHA-256: bfe794d4a74bcb844fa03ccab168718226faa8b5a4bdd8ac45452ff2fd8e3f17
ppc
httpd-2.2.3-65.el5_8.ppc.rpm SHA-256: 3f5e747b1762b688614b71cb46befb5f4f830595f2c0e38e70ba5deb28501ce4
httpd-debuginfo-2.2.3-65.el5_8.ppc.rpm SHA-256: 6ccb37d0b766fa2eb3d40d0b5ee2303ad222ccdf3d35e590bfa331db9a84c86a
httpd-debuginfo-2.2.3-65.el5_8.ppc64.rpm SHA-256: 9dab2ca31f632711b2aee9390b4d710775701d9721080572757f8e9bda3d4b97
httpd-devel-2.2.3-65.el5_8.ppc.rpm SHA-256: ebb2de6ff681ba46064677af6b015c45a62a69a712b917cea34a46ebfeeb8b99
httpd-devel-2.2.3-65.el5_8.ppc64.rpm SHA-256: 85fe6acbc082c7f245e1f4062fe60c290c144c4108dccf2d42d43a614ab3113d
httpd-manual-2.2.3-65.el5_8.ppc.rpm SHA-256: edbb2b5b93ea7d9dbfb66f474f1eec0521f8a24cff1afb1d8968adc8ffda57b3
mod_ssl-2.2.3-65.el5_8.ppc.rpm SHA-256: b9067eeea6202b7b81342d0da071cb1c1b3420b1a1af2b62182e874b7783e90e

Red Hat Enterprise Linux Server from RHUI 5

SRPM
httpd-2.2.3-65.el5_8.src.rpm SHA-256: bfe794d4a74bcb844fa03ccab168718226faa8b5a4bdd8ac45452ff2fd8e3f17
x86_64
httpd-2.2.3-65.el5_8.x86_64.rpm SHA-256: 4992dfa4ee2b508cf836e1ce8eb3aff46eb701d742867a7fba1210174c8b343f
httpd-debuginfo-2.2.3-65.el5_8.i386.rpm SHA-256: 114c3bba6cf6c08b1361bf15e6524eba349936eab8676bff0c00a39a411ac776
httpd-debuginfo-2.2.3-65.el5_8.x86_64.rpm SHA-256: 8e5381b0b20795a866201c8be1c15ef28f24ba741cc4222e965316afefb03445
httpd-devel-2.2.3-65.el5_8.i386.rpm SHA-256: 8d8400ab165556d475193378a321c7137ff82bda81478652c338fe003cfe190b
httpd-devel-2.2.3-65.el5_8.x86_64.rpm SHA-256: f024ed0d2d2ac757337ba7297564dc3dddc90a355baf7a4c8146b5414b62d449
httpd-manual-2.2.3-65.el5_8.x86_64.rpm SHA-256: 6881c0c71d7a3cf78a9358ecdde5eaeae9502fe6c6cbaebbb04fe85c3a1d839f
mod_ssl-2.2.3-65.el5_8.x86_64.rpm SHA-256: a625a404e50feb0331f54195158accd5d7cd7764394abc201ccacd7deb79d1e1
i386
httpd-2.2.3-65.el5_8.i386.rpm SHA-256: b7455031a36b0a0d4ce40084811a65e00d36a1fccb0d7bc45ed90180dbeaed51
httpd-debuginfo-2.2.3-65.el5_8.i386.rpm SHA-256: 114c3bba6cf6c08b1361bf15e6524eba349936eab8676bff0c00a39a411ac776
httpd-devel-2.2.3-65.el5_8.i386.rpm SHA-256: 8d8400ab165556d475193378a321c7137ff82bda81478652c338fe003cfe190b
httpd-manual-2.2.3-65.el5_8.i386.rpm SHA-256: 474c5cbc515db9e87c4d8641d80d9af2f75d511e763f2b903c9950440227f51e
mod_ssl-2.2.3-65.el5_8.i386.rpm SHA-256: f3cc2182ba15863e9f5ac3791feecc076230758f37ec49082c425655c3d03ebd

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility