Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2007:0662 - Security Advisory
Issued:
2007-07-13
Updated:
2007-07-13

RHSA-2007:0662 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: httpd security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated Apache httpd packages that correct a security issue are now
available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

The Apache HTTP Server is a popular Web server.

The Apache HTTP Server did not verify that a process was an Apache child
process before sending it signals. A local attacker with the ability to run
scripts on the Apache HTTP Server could manipulate the scoreboard and cause
arbitrary processes to be terminated which could lead to a denial of
service. (CVE-2007-3304).

Users of httpd should upgrade to these updated packages, which contain
backported patches to correct this issue. Users should restart Apache
after installing this update.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server 3 x86_64
  • Red Hat Enterprise Linux Server 3 ia64
  • Red Hat Enterprise Linux Server 3 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Workstation 3 x86_64
  • Red Hat Enterprise Linux Workstation 3 ia64
  • Red Hat Enterprise Linux Workstation 3 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux Desktop 3 x86_64
  • Red Hat Enterprise Linux Desktop 3 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems 3 s390x
  • Red Hat Enterprise Linux for IBM z Systems 3 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian 3 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc

Fixes

  • BZ - 245111 - CVE-2007-3304 httpd scoreboard lack of PID protection

CVEs

  • CVE-2007-3304

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
httpd-2.0.52-32.3.ent.src.rpm SHA-256: 654d43700ad63f4c608873c97fd47017239b025e1d1caf8b76ec7e30a0428207
x86_64
httpd-2.0.52-32.3.ent.x86_64.rpm SHA-256: 95f6698b1ab16f494eefc08511bc99208ff664ca4440a2fb74a77e6cab874ab7
httpd-2.0.52-32.3.ent.x86_64.rpm SHA-256: 95f6698b1ab16f494eefc08511bc99208ff664ca4440a2fb74a77e6cab874ab7
httpd-devel-2.0.52-32.3.ent.x86_64.rpm SHA-256: b3a3bb2cffcd096468d8efa7469f122de81ddb8bb5450529c50ddf11fd8e63bc
httpd-devel-2.0.52-32.3.ent.x86_64.rpm SHA-256: b3a3bb2cffcd096468d8efa7469f122de81ddb8bb5450529c50ddf11fd8e63bc
httpd-manual-2.0.52-32.3.ent.x86_64.rpm SHA-256: 08dd95a26bf64bf42db25982e1d13d0014afd0a9dd078e83361f054a95d15790
httpd-manual-2.0.52-32.3.ent.x86_64.rpm SHA-256: 08dd95a26bf64bf42db25982e1d13d0014afd0a9dd078e83361f054a95d15790
httpd-suexec-2.0.52-32.3.ent.x86_64.rpm SHA-256: 63a2e29b1f4dc66461cb03322cb93cfc3fc272195fbbe285625319235d7a9926
httpd-suexec-2.0.52-32.3.ent.x86_64.rpm SHA-256: 63a2e29b1f4dc66461cb03322cb93cfc3fc272195fbbe285625319235d7a9926
mod_ssl-2.0.52-32.3.ent.x86_64.rpm SHA-256: 5d3b951723a00d7ef88d25f6a13fe19ee6ddb57b81b468ee397db2bc136eb726
mod_ssl-2.0.52-32.3.ent.x86_64.rpm SHA-256: 5d3b951723a00d7ef88d25f6a13fe19ee6ddb57b81b468ee397db2bc136eb726
ia64
httpd-2.0.52-32.3.ent.ia64.rpm SHA-256: 3533e44e7b797f53878e725bd7be6c21e285e981b08f39f01d1f413568cdb8e5
httpd-2.0.52-32.3.ent.ia64.rpm SHA-256: 3533e44e7b797f53878e725bd7be6c21e285e981b08f39f01d1f413568cdb8e5
httpd-devel-2.0.52-32.3.ent.ia64.rpm SHA-256: 2eca373b4068126a734745f0bb32dac45dbf59d66e03a8f5f866fac398949e35
httpd-devel-2.0.52-32.3.ent.ia64.rpm SHA-256: 2eca373b4068126a734745f0bb32dac45dbf59d66e03a8f5f866fac398949e35
httpd-manual-2.0.52-32.3.ent.ia64.rpm SHA-256: 04387a1cc94813be2a0dbf7ba4d06818ceb882cc2fa8806efec2443d44d47c4d
httpd-manual-2.0.52-32.3.ent.ia64.rpm SHA-256: 04387a1cc94813be2a0dbf7ba4d06818ceb882cc2fa8806efec2443d44d47c4d
httpd-suexec-2.0.52-32.3.ent.ia64.rpm SHA-256: ac1c0bac91aa3a8edf4e786ab50fab70c8567c4199daeb7b07ccbe0229100c37
httpd-suexec-2.0.52-32.3.ent.ia64.rpm SHA-256: ac1c0bac91aa3a8edf4e786ab50fab70c8567c4199daeb7b07ccbe0229100c37
mod_ssl-2.0.52-32.3.ent.ia64.rpm SHA-256: 3497ab9d1efb20f9c4e6057329a05e8497c4d6d47f1642c53b0ea47ec0c37825
mod_ssl-2.0.52-32.3.ent.ia64.rpm SHA-256: 3497ab9d1efb20f9c4e6057329a05e8497c4d6d47f1642c53b0ea47ec0c37825
i386
httpd-2.0.52-32.3.ent.i386.rpm SHA-256: 4238f84a36d0b8a466dd99cc2f53fc85e29ae15f912c00ea35375e859305ec96
httpd-2.0.52-32.3.ent.i386.rpm SHA-256: 4238f84a36d0b8a466dd99cc2f53fc85e29ae15f912c00ea35375e859305ec96
httpd-devel-2.0.52-32.3.ent.i386.rpm SHA-256: a0eee4cdda8bbbecb077f096fc9ea17b684c952c6b99b1438e8d670e3bb986a3
httpd-devel-2.0.52-32.3.ent.i386.rpm SHA-256: a0eee4cdda8bbbecb077f096fc9ea17b684c952c6b99b1438e8d670e3bb986a3
httpd-manual-2.0.52-32.3.ent.i386.rpm SHA-256: db260f7b7af80a1be7bb0bc2b5c94ad694381a06ec684e9048d0e21e2d45f3eb
httpd-manual-2.0.52-32.3.ent.i386.rpm SHA-256: db260f7b7af80a1be7bb0bc2b5c94ad694381a06ec684e9048d0e21e2d45f3eb
httpd-suexec-2.0.52-32.3.ent.i386.rpm SHA-256: 2786c6459c3676766ca2b140b88433c618b81d7f84606840c72575f4446e57f6
httpd-suexec-2.0.52-32.3.ent.i386.rpm SHA-256: 2786c6459c3676766ca2b140b88433c618b81d7f84606840c72575f4446e57f6
mod_ssl-2.0.52-32.3.ent.i386.rpm SHA-256: 54a1951385b5d76ad12d0ac1876c0180d1c84146a723d36e5924e8acc88a08ad
mod_ssl-2.0.52-32.3.ent.i386.rpm SHA-256: 54a1951385b5d76ad12d0ac1876c0180d1c84146a723d36e5924e8acc88a08ad

Red Hat Enterprise Linux Server 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5

SRPM
httpd-2.0.52-32.3.ent.src.rpm SHA-256: 654d43700ad63f4c608873c97fd47017239b025e1d1caf8b76ec7e30a0428207
x86_64
httpd-2.0.52-32.3.ent.x86_64.rpm SHA-256: 95f6698b1ab16f494eefc08511bc99208ff664ca4440a2fb74a77e6cab874ab7
httpd-2.0.52-32.3.ent.x86_64.rpm SHA-256: 95f6698b1ab16f494eefc08511bc99208ff664ca4440a2fb74a77e6cab874ab7
httpd-devel-2.0.52-32.3.ent.x86_64.rpm SHA-256: b3a3bb2cffcd096468d8efa7469f122de81ddb8bb5450529c50ddf11fd8e63bc
httpd-devel-2.0.52-32.3.ent.x86_64.rpm SHA-256: b3a3bb2cffcd096468d8efa7469f122de81ddb8bb5450529c50ddf11fd8e63bc
httpd-manual-2.0.52-32.3.ent.x86_64.rpm SHA-256: 08dd95a26bf64bf42db25982e1d13d0014afd0a9dd078e83361f054a95d15790
httpd-manual-2.0.52-32.3.ent.x86_64.rpm SHA-256: 08dd95a26bf64bf42db25982e1d13d0014afd0a9dd078e83361f054a95d15790
httpd-suexec-2.0.52-32.3.ent.x86_64.rpm SHA-256: 63a2e29b1f4dc66461cb03322cb93cfc3fc272195fbbe285625319235d7a9926
httpd-suexec-2.0.52-32.3.ent.x86_64.rpm SHA-256: 63a2e29b1f4dc66461cb03322cb93cfc3fc272195fbbe285625319235d7a9926
mod_ssl-2.0.52-32.3.ent.x86_64.rpm SHA-256: 5d3b951723a00d7ef88d25f6a13fe19ee6ddb57b81b468ee397db2bc136eb726
mod_ssl-2.0.52-32.3.ent.x86_64.rpm SHA-256: 5d3b951723a00d7ef88d25f6a13fe19ee6ddb57b81b468ee397db2bc136eb726
ia64
httpd-2.0.52-32.3.ent.ia64.rpm SHA-256: 3533e44e7b797f53878e725bd7be6c21e285e981b08f39f01d1f413568cdb8e5
httpd-2.0.52-32.3.ent.ia64.rpm SHA-256: 3533e44e7b797f53878e725bd7be6c21e285e981b08f39f01d1f413568cdb8e5
httpd-devel-2.0.52-32.3.ent.ia64.rpm SHA-256: 2eca373b4068126a734745f0bb32dac45dbf59d66e03a8f5f866fac398949e35
httpd-devel-2.0.52-32.3.ent.ia64.rpm SHA-256: 2eca373b4068126a734745f0bb32dac45dbf59d66e03a8f5f866fac398949e35
httpd-manual-2.0.52-32.3.ent.ia64.rpm SHA-256: 04387a1cc94813be2a0dbf7ba4d06818ceb882cc2fa8806efec2443d44d47c4d
httpd-manual-2.0.52-32.3.ent.ia64.rpm SHA-256: 04387a1cc94813be2a0dbf7ba4d06818ceb882cc2fa8806efec2443d44d47c4d
httpd-suexec-2.0.52-32.3.ent.ia64.rpm SHA-256: ac1c0bac91aa3a8edf4e786ab50fab70c8567c4199daeb7b07ccbe0229100c37
httpd-suexec-2.0.52-32.3.ent.ia64.rpm SHA-256: ac1c0bac91aa3a8edf4e786ab50fab70c8567c4199daeb7b07ccbe0229100c37
mod_ssl-2.0.52-32.3.ent.ia64.rpm SHA-256: 3497ab9d1efb20f9c4e6057329a05e8497c4d6d47f1642c53b0ea47ec0c37825
mod_ssl-2.0.52-32.3.ent.ia64.rpm SHA-256: 3497ab9d1efb20f9c4e6057329a05e8497c4d6d47f1642c53b0ea47ec0c37825
i386
httpd-2.0.52-32.3.ent.i386.rpm SHA-256: 4238f84a36d0b8a466dd99cc2f53fc85e29ae15f912c00ea35375e859305ec96
httpd-2.0.52-32.3.ent.i386.rpm SHA-256: 4238f84a36d0b8a466dd99cc2f53fc85e29ae15f912c00ea35375e859305ec96
httpd-devel-2.0.52-32.3.ent.i386.rpm SHA-256: a0eee4cdda8bbbecb077f096fc9ea17b684c952c6b99b1438e8d670e3bb986a3
httpd-devel-2.0.52-32.3.ent.i386.rpm SHA-256: a0eee4cdda8bbbecb077f096fc9ea17b684c952c6b99b1438e8d670e3bb986a3
httpd-manual-2.0.52-32.3.ent.i386.rpm SHA-256: db260f7b7af80a1be7bb0bc2b5c94ad694381a06ec684e9048d0e21e2d45f3eb
httpd-manual-2.0.52-32.3.ent.i386.rpm SHA-256: db260f7b7af80a1be7bb0bc2b5c94ad694381a06ec684e9048d0e21e2d45f3eb
httpd-suexec-2.0.52-32.3.ent.i386.rpm SHA-256: 2786c6459c3676766ca2b140b88433c618b81d7f84606840c72575f4446e57f6
httpd-suexec-2.0.52-32.3.ent.i386.rpm SHA-256: 2786c6459c3676766ca2b140b88433c618b81d7f84606840c72575f4446e57f6
mod_ssl-2.0.52-32.3.ent.i386.rpm SHA-256: 54a1951385b5d76ad12d0ac1876c0180d1c84146a723d36e5924e8acc88a08ad
mod_ssl-2.0.52-32.3.ent.i386.rpm SHA-256: 54a1951385b5d76ad12d0ac1876c0180d1c84146a723d36e5924e8acc88a08ad

Red Hat Enterprise Linux Workstation 4

SRPM
httpd-2.0.52-32.3.ent.src.rpm SHA-256: 654d43700ad63f4c608873c97fd47017239b025e1d1caf8b76ec7e30a0428207
x86_64
httpd-2.0.52-32.3.ent.x86_64.rpm SHA-256: 95f6698b1ab16f494eefc08511bc99208ff664ca4440a2fb74a77e6cab874ab7
httpd-devel-2.0.52-32.3.ent.x86_64.rpm SHA-256: b3a3bb2cffcd096468d8efa7469f122de81ddb8bb5450529c50ddf11fd8e63bc
httpd-manual-2.0.52-32.3.ent.x86_64.rpm SHA-256: 08dd95a26bf64bf42db25982e1d13d0014afd0a9dd078e83361f054a95d15790
httpd-suexec-2.0.52-32.3.ent.x86_64.rpm SHA-256: 63a2e29b1f4dc66461cb03322cb93cfc3fc272195fbbe285625319235d7a9926
mod_ssl-2.0.52-32.3.ent.x86_64.rpm SHA-256: 5d3b951723a00d7ef88d25f6a13fe19ee6ddb57b81b468ee397db2bc136eb726
ia64
httpd-2.0.52-32.3.ent.ia64.rpm SHA-256: 3533e44e7b797f53878e725bd7be6c21e285e981b08f39f01d1f413568cdb8e5
httpd-devel-2.0.52-32.3.ent.ia64.rpm SHA-256: 2eca373b4068126a734745f0bb32dac45dbf59d66e03a8f5f866fac398949e35
httpd-manual-2.0.52-32.3.ent.ia64.rpm SHA-256: 04387a1cc94813be2a0dbf7ba4d06818ceb882cc2fa8806efec2443d44d47c4d
httpd-suexec-2.0.52-32.3.ent.ia64.rpm SHA-256: ac1c0bac91aa3a8edf4e786ab50fab70c8567c4199daeb7b07ccbe0229100c37
mod_ssl-2.0.52-32.3.ent.ia64.rpm SHA-256: 3497ab9d1efb20f9c4e6057329a05e8497c4d6d47f1642c53b0ea47ec0c37825
i386
httpd-2.0.52-32.3.ent.i386.rpm SHA-256: 4238f84a36d0b8a466dd99cc2f53fc85e29ae15f912c00ea35375e859305ec96
httpd-devel-2.0.52-32.3.ent.i386.rpm SHA-256: a0eee4cdda8bbbecb077f096fc9ea17b684c952c6b99b1438e8d670e3bb986a3
httpd-manual-2.0.52-32.3.ent.i386.rpm SHA-256: db260f7b7af80a1be7bb0bc2b5c94ad694381a06ec684e9048d0e21e2d45f3eb
httpd-suexec-2.0.52-32.3.ent.i386.rpm SHA-256: 2786c6459c3676766ca2b140b88433c618b81d7f84606840c72575f4446e57f6
mod_ssl-2.0.52-32.3.ent.i386.rpm SHA-256: 54a1951385b5d76ad12d0ac1876c0180d1c84146a723d36e5924e8acc88a08ad

Red Hat Enterprise Linux Workstation 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Desktop 4

SRPM
httpd-2.0.52-32.3.ent.src.rpm SHA-256: 654d43700ad63f4c608873c97fd47017239b025e1d1caf8b76ec7e30a0428207
x86_64
httpd-2.0.52-32.3.ent.x86_64.rpm SHA-256: 95f6698b1ab16f494eefc08511bc99208ff664ca4440a2fb74a77e6cab874ab7
httpd-devel-2.0.52-32.3.ent.x86_64.rpm SHA-256: b3a3bb2cffcd096468d8efa7469f122de81ddb8bb5450529c50ddf11fd8e63bc
httpd-manual-2.0.52-32.3.ent.x86_64.rpm SHA-256: 08dd95a26bf64bf42db25982e1d13d0014afd0a9dd078e83361f054a95d15790
httpd-suexec-2.0.52-32.3.ent.x86_64.rpm SHA-256: 63a2e29b1f4dc66461cb03322cb93cfc3fc272195fbbe285625319235d7a9926
mod_ssl-2.0.52-32.3.ent.x86_64.rpm SHA-256: 5d3b951723a00d7ef88d25f6a13fe19ee6ddb57b81b468ee397db2bc136eb726
i386
httpd-2.0.52-32.3.ent.i386.rpm SHA-256: 4238f84a36d0b8a466dd99cc2f53fc85e29ae15f912c00ea35375e859305ec96
httpd-devel-2.0.52-32.3.ent.i386.rpm SHA-256: a0eee4cdda8bbbecb077f096fc9ea17b684c952c6b99b1438e8d670e3bb986a3
httpd-manual-2.0.52-32.3.ent.i386.rpm SHA-256: db260f7b7af80a1be7bb0bc2b5c94ad694381a06ec684e9048d0e21e2d45f3eb
httpd-suexec-2.0.52-32.3.ent.i386.rpm SHA-256: 2786c6459c3676766ca2b140b88433c618b81d7f84606840c72575f4446e57f6
mod_ssl-2.0.52-32.3.ent.i386.rpm SHA-256: 54a1951385b5d76ad12d0ac1876c0180d1c84146a723d36e5924e8acc88a08ad

Red Hat Enterprise Linux Desktop 3

SRPM
x86_64
i386

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
httpd-2.0.52-32.3.ent.src.rpm SHA-256: 654d43700ad63f4c608873c97fd47017239b025e1d1caf8b76ec7e30a0428207
s390x
httpd-2.0.52-32.3.ent.s390x.rpm SHA-256: 87b3632d27538ad77fe13bc100a31b244869bb44fc53a7ff4599c95f536288bc
httpd-devel-2.0.52-32.3.ent.s390x.rpm SHA-256: a5533c365cbec3a08dbc2b088d229759a0f2c85aa9242fa2bfdcbbc5bc7d6183
httpd-manual-2.0.52-32.3.ent.s390x.rpm SHA-256: 55f375999da8edf7a8f6d87a2d18117bbdcc8eb5c541f77b9c656523cbcf9599
httpd-suexec-2.0.52-32.3.ent.s390x.rpm SHA-256: a704ba61eadc8a4790b2b3b703c0d573d806bf0361ffe5a9bdacb99f561950aa
mod_ssl-2.0.52-32.3.ent.s390x.rpm SHA-256: 988a27d2148c7ca777b2cb0564a98e981b2c516ebbe5ff6a0c8748cc8700a0e4
s390
httpd-2.0.52-32.3.ent.s390.rpm SHA-256: 1864a995e54330438526fefa839e63545b022e3df45b22baf12498094cbe1e58
httpd-devel-2.0.52-32.3.ent.s390.rpm SHA-256: 523455a81e2e123adfd2114deb17495a0e9ed3340c98fd788d7a2c027cac9e5a
httpd-manual-2.0.52-32.3.ent.s390.rpm SHA-256: 7f6e67d0901860d506ed7fe45c59259bde2d4554867cf73f2ebb2de9e0a0414a
httpd-suexec-2.0.52-32.3.ent.s390.rpm SHA-256: 4ca5d326e89fe2f21431418e180a9bf199959d996937b22cb0d6e93cca8683b5
mod_ssl-2.0.52-32.3.ent.s390.rpm SHA-256: 64fd6a73db1292202613270d83dec74a807fdce72c8241947c147f3145a73de7

Red Hat Enterprise Linux for IBM z Systems 3

SRPM
s390x
s390

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5

SRPM
httpd-2.0.52-32.3.ent.src.rpm SHA-256: 654d43700ad63f4c608873c97fd47017239b025e1d1caf8b76ec7e30a0428207
s390x
httpd-2.0.52-32.3.ent.s390x.rpm SHA-256: 87b3632d27538ad77fe13bc100a31b244869bb44fc53a7ff4599c95f536288bc
httpd-devel-2.0.52-32.3.ent.s390x.rpm SHA-256: a5533c365cbec3a08dbc2b088d229759a0f2c85aa9242fa2bfdcbbc5bc7d6183
httpd-manual-2.0.52-32.3.ent.s390x.rpm SHA-256: 55f375999da8edf7a8f6d87a2d18117bbdcc8eb5c541f77b9c656523cbcf9599
httpd-suexec-2.0.52-32.3.ent.s390x.rpm SHA-256: a704ba61eadc8a4790b2b3b703c0d573d806bf0361ffe5a9bdacb99f561950aa
mod_ssl-2.0.52-32.3.ent.s390x.rpm SHA-256: 988a27d2148c7ca777b2cb0564a98e981b2c516ebbe5ff6a0c8748cc8700a0e4
s390
httpd-2.0.52-32.3.ent.s390.rpm SHA-256: 1864a995e54330438526fefa839e63545b022e3df45b22baf12498094cbe1e58
httpd-devel-2.0.52-32.3.ent.s390.rpm SHA-256: 523455a81e2e123adfd2114deb17495a0e9ed3340c98fd788d7a2c027cac9e5a
httpd-manual-2.0.52-32.3.ent.s390.rpm SHA-256: 7f6e67d0901860d506ed7fe45c59259bde2d4554867cf73f2ebb2de9e0a0414a
httpd-suexec-2.0.52-32.3.ent.s390.rpm SHA-256: 4ca5d326e89fe2f21431418e180a9bf199959d996937b22cb0d6e93cca8683b5
mod_ssl-2.0.52-32.3.ent.s390.rpm SHA-256: 64fd6a73db1292202613270d83dec74a807fdce72c8241947c147f3145a73de7

Red Hat Enterprise Linux for Power, big endian 4

SRPM
httpd-2.0.52-32.3.ent.src.rpm SHA-256: 654d43700ad63f4c608873c97fd47017239b025e1d1caf8b76ec7e30a0428207
ppc
httpd-2.0.52-32.3.ent.ppc.rpm SHA-256: 42b87bb872047be0a8b3e51adbf521e5f13839459d57cb51cb06fa529f8a9ff8
httpd-devel-2.0.52-32.3.ent.ppc.rpm SHA-256: 6c6877b1f6e264fe8e6b6565761fe95da0e69feb1023d92a71b1bf1f27106b94
httpd-manual-2.0.52-32.3.ent.ppc.rpm SHA-256: 306fb21360bde73aadded3c5629575bb676d68ac71c59542a04aa40d24c9f538
httpd-suexec-2.0.52-32.3.ent.ppc.rpm SHA-256: 5581f9e2d8dfa621d4cc0c782f35084244a0b14f07b20b994224f0b05cef4bfd
mod_ssl-2.0.52-32.3.ent.ppc.rpm SHA-256: 376a7a02120f54f27ffb3b1482abe97b6d6d40dfd48db68a7fc057ae132d80ce

Red Hat Enterprise Linux for Power, big endian 3

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5

SRPM
httpd-2.0.52-32.3.ent.src.rpm SHA-256: 654d43700ad63f4c608873c97fd47017239b025e1d1caf8b76ec7e30a0428207
ppc
httpd-2.0.52-32.3.ent.ppc.rpm SHA-256: 42b87bb872047be0a8b3e51adbf521e5f13839459d57cb51cb06fa529f8a9ff8
httpd-devel-2.0.52-32.3.ent.ppc.rpm SHA-256: 6c6877b1f6e264fe8e6b6565761fe95da0e69feb1023d92a71b1bf1f27106b94
httpd-manual-2.0.52-32.3.ent.ppc.rpm SHA-256: 306fb21360bde73aadded3c5629575bb676d68ac71c59542a04aa40d24c9f538
httpd-suexec-2.0.52-32.3.ent.ppc.rpm SHA-256: 5581f9e2d8dfa621d4cc0c782f35084244a0b14f07b20b994224f0b05cef4bfd
mod_ssl-2.0.52-32.3.ent.ppc.rpm SHA-256: 376a7a02120f54f27ffb3b1482abe97b6d6d40dfd48db68a7fc057ae132d80ce

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility