Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2009:1580 - Security Advisory
Issued:
2009-11-11
Updated:
2009-11-11

RHSA-2009:1580 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: httpd security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

The Apache HTTP Server is a popular Web server.

A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure
Sockets Layer) protocols handle session renegotiation. A man-in-the-middle
attacker could use this flaw to prefix arbitrary plain text to a client's
session (for example, an HTTPS connection to a website). This could force
the server to process an attacker's request as if authenticated using the
victim's credentials. This update partially mitigates this flaw for SSL
sessions to HTTP servers using mod_ssl by rejecting client-requested
renegotiation. (CVE-2009-3555)

Note: This update does not fully resolve the issue for HTTPS servers. An
attack is still possible in configurations that require a server-initiated
renegotiation. Refer to the following Knowledgebase article for further
information: http://kbase.redhat.com/faq/docs/DOC-20491

A denial of service flaw was found in the Apache mod_deflate module. This
module continued to compress large files until compression was complete,
even if the network connection that requested the content was closed before
compression completed. This would cause mod_deflate to consume large
amounts of CPU if mod_deflate was enabled for a large file. (CVE-2009-1891)

A NULL pointer dereference flaw was found in the Apache mod_proxy_ftp
module. A malicious FTP server to which requests are being proxied could
use this flaw to crash an httpd child process via a malformed reply to the
EPSV or PASV commands, resulting in a limited denial of service.
(CVE-2009-3094)

A second flaw was found in the Apache mod_proxy_ftp module. In a reverse
proxy configuration, a remote attacker could use this flaw to bypass
intended access restrictions by creating a carefully-crafted HTTP
Authorization header, allowing the attacker to send arbitrary commands to
the FTP server. (CVE-2009-3095)

All httpd users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 509125 - CVE-2009-1891 httpd: possible temporary DoS (CPU consumption) in mod_deflate
  • BZ - 521619 - CVE-2009-3094 httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply
  • BZ - 522209 - CVE-2009-3095 httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header
  • BZ - 533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation

CVEs

  • CVE-2009-1891
  • CVE-2009-3094
  • CVE-2009-3095
  • CVE-2009-3555

References

  • http://www.redhat.com/security/updates/classification/#moderate
  • http://kbase.redhat.com/faq/docs/DOC-20491
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
httpd-2.0.52-41.ent.6.src.rpm SHA-256: d25e131dd0fe9d55252f8b8e094510a9883252e6b9903a144fe6d957eeb7dd9b
x86_64
httpd-2.0.52-41.ent.6.x86_64.rpm SHA-256: fe2ea27cc6e47113d1425e265b3c01bea85a16536accb2c1e9ff0bfc1040e962
httpd-2.0.52-41.ent.6.x86_64.rpm SHA-256: fe2ea27cc6e47113d1425e265b3c01bea85a16536accb2c1e9ff0bfc1040e962
httpd-devel-2.0.52-41.ent.6.x86_64.rpm SHA-256: 3d1705674845fc40e9addd28a99188575aed9cf0216876ebd99fac523f297b1e
httpd-devel-2.0.52-41.ent.6.x86_64.rpm SHA-256: 3d1705674845fc40e9addd28a99188575aed9cf0216876ebd99fac523f297b1e
httpd-manual-2.0.52-41.ent.6.x86_64.rpm SHA-256: c9c74d8a962892e4b8e0b80f8c8d91dac4b62fd2b19d11ed7a37b07aca9e0913
httpd-manual-2.0.52-41.ent.6.x86_64.rpm SHA-256: c9c74d8a962892e4b8e0b80f8c8d91dac4b62fd2b19d11ed7a37b07aca9e0913
httpd-suexec-2.0.52-41.ent.6.x86_64.rpm SHA-256: 8304928773d1932ffd4246cf58133a81050cdc887c6fd78b2fe37abb02c82f80
httpd-suexec-2.0.52-41.ent.6.x86_64.rpm SHA-256: 8304928773d1932ffd4246cf58133a81050cdc887c6fd78b2fe37abb02c82f80
mod_ssl-2.0.52-41.ent.6.x86_64.rpm SHA-256: 882eb00d23a2f8c519ab65fa5cdd78a64762e8aa55ffeb300cae872f023e9f95
mod_ssl-2.0.52-41.ent.6.x86_64.rpm SHA-256: 882eb00d23a2f8c519ab65fa5cdd78a64762e8aa55ffeb300cae872f023e9f95
ia64
httpd-2.0.52-41.ent.6.ia64.rpm SHA-256: 470ca4445bb3fe05ea50db5a6acf1c63cd06e073a0b14a8154fa878f5b8d02d7
httpd-2.0.52-41.ent.6.ia64.rpm SHA-256: 470ca4445bb3fe05ea50db5a6acf1c63cd06e073a0b14a8154fa878f5b8d02d7
httpd-devel-2.0.52-41.ent.6.ia64.rpm SHA-256: 8792c971ff5ae519f77d64fbf0c270970ac5c9dc95d4f8900df309579a55d4ec
httpd-devel-2.0.52-41.ent.6.ia64.rpm SHA-256: 8792c971ff5ae519f77d64fbf0c270970ac5c9dc95d4f8900df309579a55d4ec
httpd-manual-2.0.52-41.ent.6.ia64.rpm SHA-256: aafaa16126cd09d9d33d1f22cb6149ab6dad2e9e2b7483b0c2c86d091efa6464
httpd-manual-2.0.52-41.ent.6.ia64.rpm SHA-256: aafaa16126cd09d9d33d1f22cb6149ab6dad2e9e2b7483b0c2c86d091efa6464
httpd-suexec-2.0.52-41.ent.6.ia64.rpm SHA-256: bb4d00383cf54442c1c0ae693097c4ba6c95cf457b606be4bc82bf521beb110d
httpd-suexec-2.0.52-41.ent.6.ia64.rpm SHA-256: bb4d00383cf54442c1c0ae693097c4ba6c95cf457b606be4bc82bf521beb110d
mod_ssl-2.0.52-41.ent.6.ia64.rpm SHA-256: 62efd1a998612f21000363d8c3f405ffeceec6488ba341c5d40fc6ded69af0db
mod_ssl-2.0.52-41.ent.6.ia64.rpm SHA-256: 62efd1a998612f21000363d8c3f405ffeceec6488ba341c5d40fc6ded69af0db
i386
httpd-2.0.52-41.ent.6.i386.rpm SHA-256: 742425acdc922895cf2534778ecd3622e6a0f8488a0d32021fd4909012ae9e3f
httpd-2.0.52-41.ent.6.i386.rpm SHA-256: 742425acdc922895cf2534778ecd3622e6a0f8488a0d32021fd4909012ae9e3f
httpd-devel-2.0.52-41.ent.6.i386.rpm SHA-256: 0fa708d52a14a5e17006ae218306cac244d1db439c0a8ee8c40d71292035141b
httpd-devel-2.0.52-41.ent.6.i386.rpm SHA-256: 0fa708d52a14a5e17006ae218306cac244d1db439c0a8ee8c40d71292035141b
httpd-manual-2.0.52-41.ent.6.i386.rpm SHA-256: 9bce6609a1194a7cb7683372852af1f86e5d366be510ab0edb6d22b3e78e002a
httpd-manual-2.0.52-41.ent.6.i386.rpm SHA-256: 9bce6609a1194a7cb7683372852af1f86e5d366be510ab0edb6d22b3e78e002a
httpd-suexec-2.0.52-41.ent.6.i386.rpm SHA-256: 565e8e337aac787c05b8cf378111d3dbdd7132ec970f84c06093b6a073eb05a1
httpd-suexec-2.0.52-41.ent.6.i386.rpm SHA-256: 565e8e337aac787c05b8cf378111d3dbdd7132ec970f84c06093b6a073eb05a1
mod_ssl-2.0.52-41.ent.6.i386.rpm SHA-256: 57b398d5d85f2739c8fa7fbc997d3a58c1e820084f12d3bcd3dbc344ee157155
mod_ssl-2.0.52-41.ent.6.i386.rpm SHA-256: 57b398d5d85f2739c8fa7fbc997d3a58c1e820084f12d3bcd3dbc344ee157155

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
httpd-2.0.52-41.ent.6.src.rpm SHA-256: d25e131dd0fe9d55252f8b8e094510a9883252e6b9903a144fe6d957eeb7dd9b
x86_64
httpd-2.0.52-41.ent.6.x86_64.rpm SHA-256: fe2ea27cc6e47113d1425e265b3c01bea85a16536accb2c1e9ff0bfc1040e962
httpd-2.0.52-41.ent.6.x86_64.rpm SHA-256: fe2ea27cc6e47113d1425e265b3c01bea85a16536accb2c1e9ff0bfc1040e962
httpd-devel-2.0.52-41.ent.6.x86_64.rpm SHA-256: 3d1705674845fc40e9addd28a99188575aed9cf0216876ebd99fac523f297b1e
httpd-devel-2.0.52-41.ent.6.x86_64.rpm SHA-256: 3d1705674845fc40e9addd28a99188575aed9cf0216876ebd99fac523f297b1e
httpd-manual-2.0.52-41.ent.6.x86_64.rpm SHA-256: c9c74d8a962892e4b8e0b80f8c8d91dac4b62fd2b19d11ed7a37b07aca9e0913
httpd-manual-2.0.52-41.ent.6.x86_64.rpm SHA-256: c9c74d8a962892e4b8e0b80f8c8d91dac4b62fd2b19d11ed7a37b07aca9e0913
httpd-suexec-2.0.52-41.ent.6.x86_64.rpm SHA-256: 8304928773d1932ffd4246cf58133a81050cdc887c6fd78b2fe37abb02c82f80
httpd-suexec-2.0.52-41.ent.6.x86_64.rpm SHA-256: 8304928773d1932ffd4246cf58133a81050cdc887c6fd78b2fe37abb02c82f80
mod_ssl-2.0.52-41.ent.6.x86_64.rpm SHA-256: 882eb00d23a2f8c519ab65fa5cdd78a64762e8aa55ffeb300cae872f023e9f95
mod_ssl-2.0.52-41.ent.6.x86_64.rpm SHA-256: 882eb00d23a2f8c519ab65fa5cdd78a64762e8aa55ffeb300cae872f023e9f95
ia64
httpd-2.0.52-41.ent.6.ia64.rpm SHA-256: 470ca4445bb3fe05ea50db5a6acf1c63cd06e073a0b14a8154fa878f5b8d02d7
httpd-2.0.52-41.ent.6.ia64.rpm SHA-256: 470ca4445bb3fe05ea50db5a6acf1c63cd06e073a0b14a8154fa878f5b8d02d7
httpd-devel-2.0.52-41.ent.6.ia64.rpm SHA-256: 8792c971ff5ae519f77d64fbf0c270970ac5c9dc95d4f8900df309579a55d4ec
httpd-devel-2.0.52-41.ent.6.ia64.rpm SHA-256: 8792c971ff5ae519f77d64fbf0c270970ac5c9dc95d4f8900df309579a55d4ec
httpd-manual-2.0.52-41.ent.6.ia64.rpm SHA-256: aafaa16126cd09d9d33d1f22cb6149ab6dad2e9e2b7483b0c2c86d091efa6464
httpd-manual-2.0.52-41.ent.6.ia64.rpm SHA-256: aafaa16126cd09d9d33d1f22cb6149ab6dad2e9e2b7483b0c2c86d091efa6464
httpd-suexec-2.0.52-41.ent.6.ia64.rpm SHA-256: bb4d00383cf54442c1c0ae693097c4ba6c95cf457b606be4bc82bf521beb110d
httpd-suexec-2.0.52-41.ent.6.ia64.rpm SHA-256: bb4d00383cf54442c1c0ae693097c4ba6c95cf457b606be4bc82bf521beb110d
mod_ssl-2.0.52-41.ent.6.ia64.rpm SHA-256: 62efd1a998612f21000363d8c3f405ffeceec6488ba341c5d40fc6ded69af0db
mod_ssl-2.0.52-41.ent.6.ia64.rpm SHA-256: 62efd1a998612f21000363d8c3f405ffeceec6488ba341c5d40fc6ded69af0db
i386
httpd-2.0.52-41.ent.6.i386.rpm SHA-256: 742425acdc922895cf2534778ecd3622e6a0f8488a0d32021fd4909012ae9e3f
httpd-2.0.52-41.ent.6.i386.rpm SHA-256: 742425acdc922895cf2534778ecd3622e6a0f8488a0d32021fd4909012ae9e3f
httpd-devel-2.0.52-41.ent.6.i386.rpm SHA-256: 0fa708d52a14a5e17006ae218306cac244d1db439c0a8ee8c40d71292035141b
httpd-devel-2.0.52-41.ent.6.i386.rpm SHA-256: 0fa708d52a14a5e17006ae218306cac244d1db439c0a8ee8c40d71292035141b
httpd-manual-2.0.52-41.ent.6.i386.rpm SHA-256: 9bce6609a1194a7cb7683372852af1f86e5d366be510ab0edb6d22b3e78e002a
httpd-manual-2.0.52-41.ent.6.i386.rpm SHA-256: 9bce6609a1194a7cb7683372852af1f86e5d366be510ab0edb6d22b3e78e002a
httpd-suexec-2.0.52-41.ent.6.i386.rpm SHA-256: 565e8e337aac787c05b8cf378111d3dbdd7132ec970f84c06093b6a073eb05a1
httpd-suexec-2.0.52-41.ent.6.i386.rpm SHA-256: 565e8e337aac787c05b8cf378111d3dbdd7132ec970f84c06093b6a073eb05a1
mod_ssl-2.0.52-41.ent.6.i386.rpm SHA-256: 57b398d5d85f2739c8fa7fbc997d3a58c1e820084f12d3bcd3dbc344ee157155
mod_ssl-2.0.52-41.ent.6.i386.rpm SHA-256: 57b398d5d85f2739c8fa7fbc997d3a58c1e820084f12d3bcd3dbc344ee157155

Red Hat Enterprise Linux Workstation 4

SRPM
httpd-2.0.52-41.ent.6.src.rpm SHA-256: d25e131dd0fe9d55252f8b8e094510a9883252e6b9903a144fe6d957eeb7dd9b
x86_64
httpd-2.0.52-41.ent.6.x86_64.rpm SHA-256: fe2ea27cc6e47113d1425e265b3c01bea85a16536accb2c1e9ff0bfc1040e962
httpd-devel-2.0.52-41.ent.6.x86_64.rpm SHA-256: 3d1705674845fc40e9addd28a99188575aed9cf0216876ebd99fac523f297b1e
httpd-manual-2.0.52-41.ent.6.x86_64.rpm SHA-256: c9c74d8a962892e4b8e0b80f8c8d91dac4b62fd2b19d11ed7a37b07aca9e0913
httpd-suexec-2.0.52-41.ent.6.x86_64.rpm SHA-256: 8304928773d1932ffd4246cf58133a81050cdc887c6fd78b2fe37abb02c82f80
mod_ssl-2.0.52-41.ent.6.x86_64.rpm SHA-256: 882eb00d23a2f8c519ab65fa5cdd78a64762e8aa55ffeb300cae872f023e9f95
ia64
httpd-2.0.52-41.ent.6.ia64.rpm SHA-256: 470ca4445bb3fe05ea50db5a6acf1c63cd06e073a0b14a8154fa878f5b8d02d7
httpd-devel-2.0.52-41.ent.6.ia64.rpm SHA-256: 8792c971ff5ae519f77d64fbf0c270970ac5c9dc95d4f8900df309579a55d4ec
httpd-manual-2.0.52-41.ent.6.ia64.rpm SHA-256: aafaa16126cd09d9d33d1f22cb6149ab6dad2e9e2b7483b0c2c86d091efa6464
httpd-suexec-2.0.52-41.ent.6.ia64.rpm SHA-256: bb4d00383cf54442c1c0ae693097c4ba6c95cf457b606be4bc82bf521beb110d
mod_ssl-2.0.52-41.ent.6.ia64.rpm SHA-256: 62efd1a998612f21000363d8c3f405ffeceec6488ba341c5d40fc6ded69af0db
i386
httpd-2.0.52-41.ent.6.i386.rpm SHA-256: 742425acdc922895cf2534778ecd3622e6a0f8488a0d32021fd4909012ae9e3f
httpd-devel-2.0.52-41.ent.6.i386.rpm SHA-256: 0fa708d52a14a5e17006ae218306cac244d1db439c0a8ee8c40d71292035141b
httpd-manual-2.0.52-41.ent.6.i386.rpm SHA-256: 9bce6609a1194a7cb7683372852af1f86e5d366be510ab0edb6d22b3e78e002a
httpd-suexec-2.0.52-41.ent.6.i386.rpm SHA-256: 565e8e337aac787c05b8cf378111d3dbdd7132ec970f84c06093b6a073eb05a1
mod_ssl-2.0.52-41.ent.6.i386.rpm SHA-256: 57b398d5d85f2739c8fa7fbc997d3a58c1e820084f12d3bcd3dbc344ee157155

Red Hat Enterprise Linux Desktop 4

SRPM
httpd-2.0.52-41.ent.6.src.rpm SHA-256: d25e131dd0fe9d55252f8b8e094510a9883252e6b9903a144fe6d957eeb7dd9b
x86_64
httpd-2.0.52-41.ent.6.x86_64.rpm SHA-256: fe2ea27cc6e47113d1425e265b3c01bea85a16536accb2c1e9ff0bfc1040e962
httpd-devel-2.0.52-41.ent.6.x86_64.rpm SHA-256: 3d1705674845fc40e9addd28a99188575aed9cf0216876ebd99fac523f297b1e
httpd-manual-2.0.52-41.ent.6.x86_64.rpm SHA-256: c9c74d8a962892e4b8e0b80f8c8d91dac4b62fd2b19d11ed7a37b07aca9e0913
httpd-suexec-2.0.52-41.ent.6.x86_64.rpm SHA-256: 8304928773d1932ffd4246cf58133a81050cdc887c6fd78b2fe37abb02c82f80
mod_ssl-2.0.52-41.ent.6.x86_64.rpm SHA-256: 882eb00d23a2f8c519ab65fa5cdd78a64762e8aa55ffeb300cae872f023e9f95
i386
httpd-2.0.52-41.ent.6.i386.rpm SHA-256: 742425acdc922895cf2534778ecd3622e6a0f8488a0d32021fd4909012ae9e3f
httpd-devel-2.0.52-41.ent.6.i386.rpm SHA-256: 0fa708d52a14a5e17006ae218306cac244d1db439c0a8ee8c40d71292035141b
httpd-manual-2.0.52-41.ent.6.i386.rpm SHA-256: 9bce6609a1194a7cb7683372852af1f86e5d366be510ab0edb6d22b3e78e002a
httpd-suexec-2.0.52-41.ent.6.i386.rpm SHA-256: 565e8e337aac787c05b8cf378111d3dbdd7132ec970f84c06093b6a073eb05a1
mod_ssl-2.0.52-41.ent.6.i386.rpm SHA-256: 57b398d5d85f2739c8fa7fbc997d3a58c1e820084f12d3bcd3dbc344ee157155

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
httpd-2.0.52-41.ent.6.src.rpm SHA-256: d25e131dd0fe9d55252f8b8e094510a9883252e6b9903a144fe6d957eeb7dd9b
s390x
httpd-2.0.52-41.ent.6.s390x.rpm SHA-256: 1668d093b496e51d1ca99cac283968aecbeb6b280d1ccae6ceef12086de2fed2
httpd-devel-2.0.52-41.ent.6.s390x.rpm SHA-256: df75b871352984a6a40c5564561efb67cc846ff9577c1793b5ad9948d6c51745
httpd-manual-2.0.52-41.ent.6.s390x.rpm SHA-256: 7882e6c1777e0bee8d7abbb7f8cb1e1dc6f0b9d81817082bbe176205b29f3b8f
httpd-suexec-2.0.52-41.ent.6.s390x.rpm SHA-256: 3ead2af3a372e1fd073159d16d8b9ccf057a71b924eb7d9825b4a5e971bea3f0
mod_ssl-2.0.52-41.ent.6.s390x.rpm SHA-256: 31880fd44beca41b473e8b2e9fc18b32957788ccdb3c559501e37797e07e17eb
s390
httpd-2.0.52-41.ent.6.s390.rpm SHA-256: b4dcf29b745f46ef358b0c1c24c70fea26f21813f17bbbd7fcb6fad7870b211e
httpd-devel-2.0.52-41.ent.6.s390.rpm SHA-256: de290c5181687297e84e2818a49e700b1c6bb8ffa8302b9b3ef5772e48a8f0da
httpd-manual-2.0.52-41.ent.6.s390.rpm SHA-256: 511f0caecbe9e725c1037e66e718f6fada712178cd8cbb86c98cd2ce967c0980
httpd-suexec-2.0.52-41.ent.6.s390.rpm SHA-256: 98553179d699c1c478cb86b8092faef840617437c03d95816752a367c2dbe1a6
mod_ssl-2.0.52-41.ent.6.s390.rpm SHA-256: 90ea52bb493ec32f09c97b3e1535a7db857bb2ee4005f6f67883ac52c6abcf28

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
httpd-2.0.52-41.ent.6.src.rpm SHA-256: d25e131dd0fe9d55252f8b8e094510a9883252e6b9903a144fe6d957eeb7dd9b
s390x
httpd-2.0.52-41.ent.6.s390x.rpm SHA-256: 1668d093b496e51d1ca99cac283968aecbeb6b280d1ccae6ceef12086de2fed2
httpd-devel-2.0.52-41.ent.6.s390x.rpm SHA-256: df75b871352984a6a40c5564561efb67cc846ff9577c1793b5ad9948d6c51745
httpd-manual-2.0.52-41.ent.6.s390x.rpm SHA-256: 7882e6c1777e0bee8d7abbb7f8cb1e1dc6f0b9d81817082bbe176205b29f3b8f
httpd-suexec-2.0.52-41.ent.6.s390x.rpm SHA-256: 3ead2af3a372e1fd073159d16d8b9ccf057a71b924eb7d9825b4a5e971bea3f0
mod_ssl-2.0.52-41.ent.6.s390x.rpm SHA-256: 31880fd44beca41b473e8b2e9fc18b32957788ccdb3c559501e37797e07e17eb
s390
httpd-2.0.52-41.ent.6.s390.rpm SHA-256: b4dcf29b745f46ef358b0c1c24c70fea26f21813f17bbbd7fcb6fad7870b211e
httpd-devel-2.0.52-41.ent.6.s390.rpm SHA-256: de290c5181687297e84e2818a49e700b1c6bb8ffa8302b9b3ef5772e48a8f0da
httpd-manual-2.0.52-41.ent.6.s390.rpm SHA-256: 511f0caecbe9e725c1037e66e718f6fada712178cd8cbb86c98cd2ce967c0980
httpd-suexec-2.0.52-41.ent.6.s390.rpm SHA-256: 98553179d699c1c478cb86b8092faef840617437c03d95816752a367c2dbe1a6
mod_ssl-2.0.52-41.ent.6.s390.rpm SHA-256: 90ea52bb493ec32f09c97b3e1535a7db857bb2ee4005f6f67883ac52c6abcf28

Red Hat Enterprise Linux for Power, big endian 4

SRPM
httpd-2.0.52-41.ent.6.src.rpm SHA-256: d25e131dd0fe9d55252f8b8e094510a9883252e6b9903a144fe6d957eeb7dd9b
ppc
httpd-2.0.52-41.ent.6.ppc.rpm SHA-256: c79037af5bc67fcbe9bd0e3a42cb7952b583fadcd992fd8a258aef1982501cf8
httpd-devel-2.0.52-41.ent.6.ppc.rpm SHA-256: 81f587546fa1a86fa7b6a1201a3918050a1c289354b2e3200ef9925f2380f2b3
httpd-manual-2.0.52-41.ent.6.ppc.rpm SHA-256: ab200150da1048519f7ed288193495f549f4b844c0a0db0ce7b6e6f5277e42e1
httpd-suexec-2.0.52-41.ent.6.ppc.rpm SHA-256: a5b5848eab799d9daacc7112dec2a068ac5777d9fb98cc7cf982fa6ce4bdec17
mod_ssl-2.0.52-41.ent.6.ppc.rpm SHA-256: 8d2f58e8df346c50fbc71dbc38fba058f99bcde8130c1ddf3d65e5d75cf63b59

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
httpd-2.0.52-41.ent.6.src.rpm SHA-256: d25e131dd0fe9d55252f8b8e094510a9883252e6b9903a144fe6d957eeb7dd9b
ppc
httpd-2.0.52-41.ent.6.ppc.rpm SHA-256: c79037af5bc67fcbe9bd0e3a42cb7952b583fadcd992fd8a258aef1982501cf8
httpd-devel-2.0.52-41.ent.6.ppc.rpm SHA-256: 81f587546fa1a86fa7b6a1201a3918050a1c289354b2e3200ef9925f2380f2b3
httpd-manual-2.0.52-41.ent.6.ppc.rpm SHA-256: ab200150da1048519f7ed288193495f549f4b844c0a0db0ce7b6e6f5277e42e1
httpd-suexec-2.0.52-41.ent.6.ppc.rpm SHA-256: a5b5848eab799d9daacc7112dec2a068ac5777d9fb98cc7cf982fa6ce4bdec17
mod_ssl-2.0.52-41.ent.6.ppc.rpm SHA-256: 8d2f58e8df346c50fbc71dbc38fba058f99bcde8130c1ddf3d65e5d75cf63b59

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter