Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0175 - Security Advisory
Issued:
2010-03-25
Updated:
2010-03-25

RHSA-2010:0175 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: httpd security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd packages that fix one security issue, a bug, and add an
enhancement are now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The Apache HTTP Server is a popular web server.

A use-after-free flaw was discovered in the way the Apache HTTP Server
handled request headers in subrequests. In configurations where subrequests
are used, a multithreaded MPM (Multi-Processing Module) could possibly leak
information from other requests in request replies. (CVE-2010-0434)

This update also fixes the following bug:

  • a bug was found in the mod_dav module. If a PUT request for an existing

file failed, that file would be unexpectedly deleted and a "Could not get
next bucket brigade" error logged. With this update, failed PUT requests no
longer cause mod_dav to delete files, which resolves this issue.
(BZ#572932)

As well, this update adds the following enhancement:

  • with the updated openssl packages from RHSA-2010:0163 installed, mod_ssl

will refuse to renegotiate a TLS/SSL connection with an unpatched client
that does not support RFC 5746. This update adds the
"SSLInsecureRenegotiation" configuration directive. If this directive is
enabled, mod_ssl will renegotiate insecurely with unpatched clients.
(BZ#575805)

Refer to the following Red Hat Knowledgebase article for more details about
the changed mod_ssl behavior: http://kbase.redhat.com/faq/docs/DOC-20491

All httpd users should upgrade to these updated packages, which contain
backported patches to correct these issues and add this enhancement. After
installing the updated packages, the httpd daemon must be restarted for the
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 570171 - CVE-2010-0434 httpd: request header information leak
  • BZ - 572932 - "could not get next bucket brigade" while a client is doing a PUT results in data loss
  • BZ - 575805 - mod_ssl: Add SSLInsecureRenegotiation directive [rhel-4]

CVEs

  • CVE-2010-0434

References

  • http://www.redhat.com/security/updates/classification/#low
  • http://kbase.redhat.com/faq/docs/DOC-20491
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
httpd-2.0.52-41.ent.7.src.rpm SHA-256: ae0b98c6e389907abc2b2e858457818ce0a22e6e74d121e1fe5b79eb061b997d
x86_64
httpd-2.0.52-41.ent.7.x86_64.rpm SHA-256: 781c6e52d1c15f22cd5c5bf9574a51a689768197e84716cbf5c4abdfc6628ed8
httpd-2.0.52-41.ent.7.x86_64.rpm SHA-256: 781c6e52d1c15f22cd5c5bf9574a51a689768197e84716cbf5c4abdfc6628ed8
httpd-devel-2.0.52-41.ent.7.x86_64.rpm SHA-256: 5b0d80f0b78c36de13ebf9ec338c8c20ed9280aef11b93b7df8f423cd1f02b0d
httpd-devel-2.0.52-41.ent.7.x86_64.rpm SHA-256: 5b0d80f0b78c36de13ebf9ec338c8c20ed9280aef11b93b7df8f423cd1f02b0d
httpd-manual-2.0.52-41.ent.7.x86_64.rpm SHA-256: af5dc4af9196f338e5aae5c26cdbe9b229088d14876e4c6ac618265e4f41e5fc
httpd-manual-2.0.52-41.ent.7.x86_64.rpm SHA-256: af5dc4af9196f338e5aae5c26cdbe9b229088d14876e4c6ac618265e4f41e5fc
httpd-suexec-2.0.52-41.ent.7.x86_64.rpm SHA-256: b297b866225c3ad3090efda0002014fa16397a7afb04b0b6c6efe84efbcb828c
httpd-suexec-2.0.52-41.ent.7.x86_64.rpm SHA-256: b297b866225c3ad3090efda0002014fa16397a7afb04b0b6c6efe84efbcb828c
mod_ssl-2.0.52-41.ent.7.x86_64.rpm SHA-256: 04fccd05ffd4b30efddf7f28aa868f1038597a7661cb0cd54e1c8d7ca21bf6d8
mod_ssl-2.0.52-41.ent.7.x86_64.rpm SHA-256: 04fccd05ffd4b30efddf7f28aa868f1038597a7661cb0cd54e1c8d7ca21bf6d8
ia64
httpd-2.0.52-41.ent.7.ia64.rpm SHA-256: 85756acb374228481c4b6659e84663a84b01bb449e335c036587f1052bfe185d
httpd-2.0.52-41.ent.7.ia64.rpm SHA-256: 85756acb374228481c4b6659e84663a84b01bb449e335c036587f1052bfe185d
httpd-devel-2.0.52-41.ent.7.ia64.rpm SHA-256: 3cea4a25b3630a69a083aa6a48837d806550afcc5e3c0a60aec8daecadd6e3c0
httpd-devel-2.0.52-41.ent.7.ia64.rpm SHA-256: 3cea4a25b3630a69a083aa6a48837d806550afcc5e3c0a60aec8daecadd6e3c0
httpd-manual-2.0.52-41.ent.7.ia64.rpm SHA-256: b4fa75d401d1437165240e5914563ef3a7c0fef009eaad250d140b5687a1b264
httpd-manual-2.0.52-41.ent.7.ia64.rpm SHA-256: b4fa75d401d1437165240e5914563ef3a7c0fef009eaad250d140b5687a1b264
httpd-suexec-2.0.52-41.ent.7.ia64.rpm SHA-256: 342bbc3b97e415d71ac69737322a2373335d496202d04bc911ed9062f1e1f721
httpd-suexec-2.0.52-41.ent.7.ia64.rpm SHA-256: 342bbc3b97e415d71ac69737322a2373335d496202d04bc911ed9062f1e1f721
mod_ssl-2.0.52-41.ent.7.ia64.rpm SHA-256: be564cbe721a91cef1acfafdbef4014f8e651d86d0c2e352581297d30e83deae
mod_ssl-2.0.52-41.ent.7.ia64.rpm SHA-256: be564cbe721a91cef1acfafdbef4014f8e651d86d0c2e352581297d30e83deae
i386
httpd-2.0.52-41.ent.7.i386.rpm SHA-256: b1e87471c1cfe67d7dbe3bb114fc7efbec9879a298e18c3c31266e41437eb909
httpd-2.0.52-41.ent.7.i386.rpm SHA-256: b1e87471c1cfe67d7dbe3bb114fc7efbec9879a298e18c3c31266e41437eb909
httpd-devel-2.0.52-41.ent.7.i386.rpm SHA-256: 6a8fb0d8895588e7ac3c9f072a63cfb501fa9b080db97fb5abb9fc34ebef4207
httpd-devel-2.0.52-41.ent.7.i386.rpm SHA-256: 6a8fb0d8895588e7ac3c9f072a63cfb501fa9b080db97fb5abb9fc34ebef4207
httpd-manual-2.0.52-41.ent.7.i386.rpm SHA-256: 100ceca935549eda721b5dd18cc6138d5d3574384291caf175b818e883be9920
httpd-manual-2.0.52-41.ent.7.i386.rpm SHA-256: 100ceca935549eda721b5dd18cc6138d5d3574384291caf175b818e883be9920
httpd-suexec-2.0.52-41.ent.7.i386.rpm SHA-256: b38e09ce58705b494708a069199df2c5fb21c9b8928fe053f5b0d5ee60545c6b
httpd-suexec-2.0.52-41.ent.7.i386.rpm SHA-256: b38e09ce58705b494708a069199df2c5fb21c9b8928fe053f5b0d5ee60545c6b
mod_ssl-2.0.52-41.ent.7.i386.rpm SHA-256: 95398d1e83b42eaa4156775325ab61b9fc1dc0d9d02742304261080c1cf2ff04
mod_ssl-2.0.52-41.ent.7.i386.rpm SHA-256: 95398d1e83b42eaa4156775325ab61b9fc1dc0d9d02742304261080c1cf2ff04

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
httpd-2.0.52-41.ent.7.src.rpm SHA-256: ae0b98c6e389907abc2b2e858457818ce0a22e6e74d121e1fe5b79eb061b997d
x86_64
httpd-2.0.52-41.ent.7.x86_64.rpm SHA-256: 781c6e52d1c15f22cd5c5bf9574a51a689768197e84716cbf5c4abdfc6628ed8
httpd-2.0.52-41.ent.7.x86_64.rpm SHA-256: 781c6e52d1c15f22cd5c5bf9574a51a689768197e84716cbf5c4abdfc6628ed8
httpd-devel-2.0.52-41.ent.7.x86_64.rpm SHA-256: 5b0d80f0b78c36de13ebf9ec338c8c20ed9280aef11b93b7df8f423cd1f02b0d
httpd-devel-2.0.52-41.ent.7.x86_64.rpm SHA-256: 5b0d80f0b78c36de13ebf9ec338c8c20ed9280aef11b93b7df8f423cd1f02b0d
httpd-manual-2.0.52-41.ent.7.x86_64.rpm SHA-256: af5dc4af9196f338e5aae5c26cdbe9b229088d14876e4c6ac618265e4f41e5fc
httpd-manual-2.0.52-41.ent.7.x86_64.rpm SHA-256: af5dc4af9196f338e5aae5c26cdbe9b229088d14876e4c6ac618265e4f41e5fc
httpd-suexec-2.0.52-41.ent.7.x86_64.rpm SHA-256: b297b866225c3ad3090efda0002014fa16397a7afb04b0b6c6efe84efbcb828c
httpd-suexec-2.0.52-41.ent.7.x86_64.rpm SHA-256: b297b866225c3ad3090efda0002014fa16397a7afb04b0b6c6efe84efbcb828c
mod_ssl-2.0.52-41.ent.7.x86_64.rpm SHA-256: 04fccd05ffd4b30efddf7f28aa868f1038597a7661cb0cd54e1c8d7ca21bf6d8
mod_ssl-2.0.52-41.ent.7.x86_64.rpm SHA-256: 04fccd05ffd4b30efddf7f28aa868f1038597a7661cb0cd54e1c8d7ca21bf6d8
ia64
httpd-2.0.52-41.ent.7.ia64.rpm SHA-256: 85756acb374228481c4b6659e84663a84b01bb449e335c036587f1052bfe185d
httpd-2.0.52-41.ent.7.ia64.rpm SHA-256: 85756acb374228481c4b6659e84663a84b01bb449e335c036587f1052bfe185d
httpd-devel-2.0.52-41.ent.7.ia64.rpm SHA-256: 3cea4a25b3630a69a083aa6a48837d806550afcc5e3c0a60aec8daecadd6e3c0
httpd-devel-2.0.52-41.ent.7.ia64.rpm SHA-256: 3cea4a25b3630a69a083aa6a48837d806550afcc5e3c0a60aec8daecadd6e3c0
httpd-manual-2.0.52-41.ent.7.ia64.rpm SHA-256: b4fa75d401d1437165240e5914563ef3a7c0fef009eaad250d140b5687a1b264
httpd-manual-2.0.52-41.ent.7.ia64.rpm SHA-256: b4fa75d401d1437165240e5914563ef3a7c0fef009eaad250d140b5687a1b264
httpd-suexec-2.0.52-41.ent.7.ia64.rpm SHA-256: 342bbc3b97e415d71ac69737322a2373335d496202d04bc911ed9062f1e1f721
httpd-suexec-2.0.52-41.ent.7.ia64.rpm SHA-256: 342bbc3b97e415d71ac69737322a2373335d496202d04bc911ed9062f1e1f721
mod_ssl-2.0.52-41.ent.7.ia64.rpm SHA-256: be564cbe721a91cef1acfafdbef4014f8e651d86d0c2e352581297d30e83deae
mod_ssl-2.0.52-41.ent.7.ia64.rpm SHA-256: be564cbe721a91cef1acfafdbef4014f8e651d86d0c2e352581297d30e83deae
i386
httpd-2.0.52-41.ent.7.i386.rpm SHA-256: b1e87471c1cfe67d7dbe3bb114fc7efbec9879a298e18c3c31266e41437eb909
httpd-2.0.52-41.ent.7.i386.rpm SHA-256: b1e87471c1cfe67d7dbe3bb114fc7efbec9879a298e18c3c31266e41437eb909
httpd-devel-2.0.52-41.ent.7.i386.rpm SHA-256: 6a8fb0d8895588e7ac3c9f072a63cfb501fa9b080db97fb5abb9fc34ebef4207
httpd-devel-2.0.52-41.ent.7.i386.rpm SHA-256: 6a8fb0d8895588e7ac3c9f072a63cfb501fa9b080db97fb5abb9fc34ebef4207
httpd-manual-2.0.52-41.ent.7.i386.rpm SHA-256: 100ceca935549eda721b5dd18cc6138d5d3574384291caf175b818e883be9920
httpd-manual-2.0.52-41.ent.7.i386.rpm SHA-256: 100ceca935549eda721b5dd18cc6138d5d3574384291caf175b818e883be9920
httpd-suexec-2.0.52-41.ent.7.i386.rpm SHA-256: b38e09ce58705b494708a069199df2c5fb21c9b8928fe053f5b0d5ee60545c6b
httpd-suexec-2.0.52-41.ent.7.i386.rpm SHA-256: b38e09ce58705b494708a069199df2c5fb21c9b8928fe053f5b0d5ee60545c6b
mod_ssl-2.0.52-41.ent.7.i386.rpm SHA-256: 95398d1e83b42eaa4156775325ab61b9fc1dc0d9d02742304261080c1cf2ff04
mod_ssl-2.0.52-41.ent.7.i386.rpm SHA-256: 95398d1e83b42eaa4156775325ab61b9fc1dc0d9d02742304261080c1cf2ff04

Red Hat Enterprise Linux Workstation 4

SRPM
httpd-2.0.52-41.ent.7.src.rpm SHA-256: ae0b98c6e389907abc2b2e858457818ce0a22e6e74d121e1fe5b79eb061b997d
x86_64
httpd-2.0.52-41.ent.7.x86_64.rpm SHA-256: 781c6e52d1c15f22cd5c5bf9574a51a689768197e84716cbf5c4abdfc6628ed8
httpd-devel-2.0.52-41.ent.7.x86_64.rpm SHA-256: 5b0d80f0b78c36de13ebf9ec338c8c20ed9280aef11b93b7df8f423cd1f02b0d
httpd-manual-2.0.52-41.ent.7.x86_64.rpm SHA-256: af5dc4af9196f338e5aae5c26cdbe9b229088d14876e4c6ac618265e4f41e5fc
httpd-suexec-2.0.52-41.ent.7.x86_64.rpm SHA-256: b297b866225c3ad3090efda0002014fa16397a7afb04b0b6c6efe84efbcb828c
mod_ssl-2.0.52-41.ent.7.x86_64.rpm SHA-256: 04fccd05ffd4b30efddf7f28aa868f1038597a7661cb0cd54e1c8d7ca21bf6d8
ia64
httpd-2.0.52-41.ent.7.ia64.rpm SHA-256: 85756acb374228481c4b6659e84663a84b01bb449e335c036587f1052bfe185d
httpd-devel-2.0.52-41.ent.7.ia64.rpm SHA-256: 3cea4a25b3630a69a083aa6a48837d806550afcc5e3c0a60aec8daecadd6e3c0
httpd-manual-2.0.52-41.ent.7.ia64.rpm SHA-256: b4fa75d401d1437165240e5914563ef3a7c0fef009eaad250d140b5687a1b264
httpd-suexec-2.0.52-41.ent.7.ia64.rpm SHA-256: 342bbc3b97e415d71ac69737322a2373335d496202d04bc911ed9062f1e1f721
mod_ssl-2.0.52-41.ent.7.ia64.rpm SHA-256: be564cbe721a91cef1acfafdbef4014f8e651d86d0c2e352581297d30e83deae
i386
httpd-2.0.52-41.ent.7.i386.rpm SHA-256: b1e87471c1cfe67d7dbe3bb114fc7efbec9879a298e18c3c31266e41437eb909
httpd-devel-2.0.52-41.ent.7.i386.rpm SHA-256: 6a8fb0d8895588e7ac3c9f072a63cfb501fa9b080db97fb5abb9fc34ebef4207
httpd-manual-2.0.52-41.ent.7.i386.rpm SHA-256: 100ceca935549eda721b5dd18cc6138d5d3574384291caf175b818e883be9920
httpd-suexec-2.0.52-41.ent.7.i386.rpm SHA-256: b38e09ce58705b494708a069199df2c5fb21c9b8928fe053f5b0d5ee60545c6b
mod_ssl-2.0.52-41.ent.7.i386.rpm SHA-256: 95398d1e83b42eaa4156775325ab61b9fc1dc0d9d02742304261080c1cf2ff04

Red Hat Enterprise Linux Desktop 4

SRPM
httpd-2.0.52-41.ent.7.src.rpm SHA-256: ae0b98c6e389907abc2b2e858457818ce0a22e6e74d121e1fe5b79eb061b997d
x86_64
httpd-2.0.52-41.ent.7.x86_64.rpm SHA-256: 781c6e52d1c15f22cd5c5bf9574a51a689768197e84716cbf5c4abdfc6628ed8
httpd-devel-2.0.52-41.ent.7.x86_64.rpm SHA-256: 5b0d80f0b78c36de13ebf9ec338c8c20ed9280aef11b93b7df8f423cd1f02b0d
httpd-manual-2.0.52-41.ent.7.x86_64.rpm SHA-256: af5dc4af9196f338e5aae5c26cdbe9b229088d14876e4c6ac618265e4f41e5fc
httpd-suexec-2.0.52-41.ent.7.x86_64.rpm SHA-256: b297b866225c3ad3090efda0002014fa16397a7afb04b0b6c6efe84efbcb828c
mod_ssl-2.0.52-41.ent.7.x86_64.rpm SHA-256: 04fccd05ffd4b30efddf7f28aa868f1038597a7661cb0cd54e1c8d7ca21bf6d8
i386
httpd-2.0.52-41.ent.7.i386.rpm SHA-256: b1e87471c1cfe67d7dbe3bb114fc7efbec9879a298e18c3c31266e41437eb909
httpd-devel-2.0.52-41.ent.7.i386.rpm SHA-256: 6a8fb0d8895588e7ac3c9f072a63cfb501fa9b080db97fb5abb9fc34ebef4207
httpd-manual-2.0.52-41.ent.7.i386.rpm SHA-256: 100ceca935549eda721b5dd18cc6138d5d3574384291caf175b818e883be9920
httpd-suexec-2.0.52-41.ent.7.i386.rpm SHA-256: b38e09ce58705b494708a069199df2c5fb21c9b8928fe053f5b0d5ee60545c6b
mod_ssl-2.0.52-41.ent.7.i386.rpm SHA-256: 95398d1e83b42eaa4156775325ab61b9fc1dc0d9d02742304261080c1cf2ff04

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
httpd-2.0.52-41.ent.7.src.rpm SHA-256: ae0b98c6e389907abc2b2e858457818ce0a22e6e74d121e1fe5b79eb061b997d
s390x
httpd-2.0.52-41.ent.7.s390x.rpm SHA-256: a41be360ec5df3abfc13bef0bd6b91e5ca441999a9fd0fd27140b4f73af5e63a
httpd-devel-2.0.52-41.ent.7.s390x.rpm SHA-256: db8ff8a2a80f495a4fb192f676830e017acf18007303266646a68f40e9416709
httpd-manual-2.0.52-41.ent.7.s390x.rpm SHA-256: 89e32034d95c24da598228a8ee747627d71b1275413972663a0261d126677044
httpd-suexec-2.0.52-41.ent.7.s390x.rpm SHA-256: f3306d1e73e5b14ca777f126399bce46f0ec2e36280000c5cd20b910121b2da3
mod_ssl-2.0.52-41.ent.7.s390x.rpm SHA-256: 90172e8ce060189a2c1ec8dd41183a9229245219e431b342c0337ee88fde4240
s390
httpd-2.0.52-41.ent.7.s390.rpm SHA-256: 69cffb6594ef577fc52afe2c3c323051b0ac7b557f9fae648e53375ae0921a13
httpd-devel-2.0.52-41.ent.7.s390.rpm SHA-256: d33a34d71b10a7c5e505ec1b3acaff307b10070c3b7148e4da4cef5e54033852
httpd-manual-2.0.52-41.ent.7.s390.rpm SHA-256: ea3e90377a338ec5b5ec3ac765898c99699e212991285756df54200491a47314
httpd-suexec-2.0.52-41.ent.7.s390.rpm SHA-256: f78801b8e3c5a7b4682034021275b45848aab07718cbe614ba67100decd09476
mod_ssl-2.0.52-41.ent.7.s390.rpm SHA-256: fde3a32f44d5499440391b258cd80671a0fe3c403a8658c072ea18f50ebeb6ec

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
httpd-2.0.52-41.ent.7.src.rpm SHA-256: ae0b98c6e389907abc2b2e858457818ce0a22e6e74d121e1fe5b79eb061b997d
s390x
httpd-2.0.52-41.ent.7.s390x.rpm SHA-256: a41be360ec5df3abfc13bef0bd6b91e5ca441999a9fd0fd27140b4f73af5e63a
httpd-devel-2.0.52-41.ent.7.s390x.rpm SHA-256: db8ff8a2a80f495a4fb192f676830e017acf18007303266646a68f40e9416709
httpd-manual-2.0.52-41.ent.7.s390x.rpm SHA-256: 89e32034d95c24da598228a8ee747627d71b1275413972663a0261d126677044
httpd-suexec-2.0.52-41.ent.7.s390x.rpm SHA-256: f3306d1e73e5b14ca777f126399bce46f0ec2e36280000c5cd20b910121b2da3
mod_ssl-2.0.52-41.ent.7.s390x.rpm SHA-256: 90172e8ce060189a2c1ec8dd41183a9229245219e431b342c0337ee88fde4240
s390
httpd-2.0.52-41.ent.7.s390.rpm SHA-256: 69cffb6594ef577fc52afe2c3c323051b0ac7b557f9fae648e53375ae0921a13
httpd-devel-2.0.52-41.ent.7.s390.rpm SHA-256: d33a34d71b10a7c5e505ec1b3acaff307b10070c3b7148e4da4cef5e54033852
httpd-manual-2.0.52-41.ent.7.s390.rpm SHA-256: ea3e90377a338ec5b5ec3ac765898c99699e212991285756df54200491a47314
httpd-suexec-2.0.52-41.ent.7.s390.rpm SHA-256: f78801b8e3c5a7b4682034021275b45848aab07718cbe614ba67100decd09476
mod_ssl-2.0.52-41.ent.7.s390.rpm SHA-256: fde3a32f44d5499440391b258cd80671a0fe3c403a8658c072ea18f50ebeb6ec

Red Hat Enterprise Linux for Power, big endian 4

SRPM
httpd-2.0.52-41.ent.7.src.rpm SHA-256: ae0b98c6e389907abc2b2e858457818ce0a22e6e74d121e1fe5b79eb061b997d
ppc
httpd-2.0.52-41.ent.7.ppc.rpm SHA-256: fad5dcb5cae0478b07cbeb102b82e2c978bda6002e15b491cd7d15b187db368d
httpd-devel-2.0.52-41.ent.7.ppc.rpm SHA-256: ba9bf7f08078cbeb97f7fe336192de8a9953a70cd932d520cd8edf75c0ce069d
httpd-manual-2.0.52-41.ent.7.ppc.rpm SHA-256: 33d5115a86dbb89de71b9fbf5bce75289bcb0d3aa614d05c17d156c04595fc6c
httpd-suexec-2.0.52-41.ent.7.ppc.rpm SHA-256: 56449352b8cdb80f189c4c9c302deb3433a9a63e2cbf81f2310726f2478d2a42
mod_ssl-2.0.52-41.ent.7.ppc.rpm SHA-256: 22c2827b3e4c75c24aa0d3d4cbfa160ceea25802c948a6c52c656c7d16b406b6

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
httpd-2.0.52-41.ent.7.src.rpm SHA-256: ae0b98c6e389907abc2b2e858457818ce0a22e6e74d121e1fe5b79eb061b997d
ppc
httpd-2.0.52-41.ent.7.ppc.rpm SHA-256: fad5dcb5cae0478b07cbeb102b82e2c978bda6002e15b491cd7d15b187db368d
httpd-devel-2.0.52-41.ent.7.ppc.rpm SHA-256: ba9bf7f08078cbeb97f7fe336192de8a9953a70cd932d520cd8edf75c0ce069d
httpd-manual-2.0.52-41.ent.7.ppc.rpm SHA-256: 33d5115a86dbb89de71b9fbf5bce75289bcb0d3aa614d05c17d156c04595fc6c
httpd-suexec-2.0.52-41.ent.7.ppc.rpm SHA-256: 56449352b8cdb80f189c4c9c302deb3433a9a63e2cbf81f2310726f2478d2a42
mod_ssl-2.0.52-41.ent.7.ppc.rpm SHA-256: 22c2827b3e4c75c24aa0d3d4cbfa160ceea25802c948a6c52c656c7d16b406b6

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility