Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2011:1391 - Security Advisory
Issued:
2011-10-20
Updated:
2011-10-20

RHSA-2011:1391 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: httpd security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The Apache HTTP Server is a popular web server.

It was discovered that the Apache HTTP Server did not properly validate the
request URI for proxied requests. In certain configurations, if a reverse
proxy used the ProxyPassMatch directive, or if it used the RewriteRule
directive with the proxy flag, a remote attacker could make the proxy
connect to an arbitrary server, possibly disclosing sensitive information
from internal web servers not directly accessible to the attacker.
(CVE-2011-3368)

It was discovered that mod_proxy_ajp incorrectly returned an "Internal
Server Error" response when processing certain malformed HTTP requests,
which caused the back-end server to be marked as failed in configurations
where mod_proxy was used in load balancer mode. A remote attacker could
cause mod_proxy to not send requests to back-end AJP (Apache JServ
Protocol) servers for the retry timeout period or until all back-end
servers were marked as failed. (CVE-2011-3348)

Red Hat would like to thank Context Information Security for reporting the
CVE-2011-3368 issue.

This update also fixes the following bug:

  • The fix for CVE-2011-3192 provided by the RHSA-2011:1245 update

introduced regressions in the way httpd handled certain Range HTTP header
values. This update corrects those regressions. (BZ#736592)

All httpd users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 736592 - httpd: RHSA-2011:1245 regressions [rhel-6]
  • BZ - 736690 - CVE-2011-3348 httpd: mod_proxy_ajp remote temporary DoS
  • BZ - 740045 - CVE-2011-3368 httpd: reverse web proxy vulnerability

CVEs

  • CVE-2011-3368
  • CVE-2011-3348

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://rhn.redhat.com/errata/RHSA-2011-1245.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
x86_64
httpd-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 4aea72fa618286d52f91d2734136e97b84f76e935910c34742d7f29da1ee4333
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-devel-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: dad8001fd57356940a35c043d35e8159f2c4ffb41891a5da4257557e2e67dacc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 097c45cd9975f7466f9b7c8513681bf8d9cc3d66c074129be950fadffb634d00
mod_ssl-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: cebbebe1ef9d4a58404b416f820be3058fda8de94dd954803dfcc6e5d2d1bcc9
i386
httpd-2.2.15-9.el6_1.3.i686.rpm SHA-256: a8e9058fe499614f3664d20131efaa94a94b79bd67e75eb9505c7e71dcc14f69
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.i686.rpm SHA-256: 340493c08b5faa38d32d9306e5ce497a8ff9478dd731db9c45d08adbc8cbe0f8
mod_ssl-2.2.15-9.el6_1.3.i686.rpm SHA-256: c47324ee8e8b173e1c4e804697ba920015acf340ab52e377330a17ef312c32dc

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
x86_64
httpd-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 4aea72fa618286d52f91d2734136e97b84f76e935910c34742d7f29da1ee4333
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-devel-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: dad8001fd57356940a35c043d35e8159f2c4ffb41891a5da4257557e2e67dacc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 097c45cd9975f7466f9b7c8513681bf8d9cc3d66c074129be950fadffb634d00
mod_ssl-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: cebbebe1ef9d4a58404b416f820be3058fda8de94dd954803dfcc6e5d2d1bcc9
i386
httpd-2.2.15-9.el6_1.3.i686.rpm SHA-256: a8e9058fe499614f3664d20131efaa94a94b79bd67e75eb9505c7e71dcc14f69
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.i686.rpm SHA-256: 340493c08b5faa38d32d9306e5ce497a8ff9478dd731db9c45d08adbc8cbe0f8
mod_ssl-2.2.15-9.el6_1.3.i686.rpm SHA-256: c47324ee8e8b173e1c4e804697ba920015acf340ab52e377330a17ef312c32dc

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
x86_64
httpd-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 4aea72fa618286d52f91d2734136e97b84f76e935910c34742d7f29da1ee4333
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-devel-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: dad8001fd57356940a35c043d35e8159f2c4ffb41891a5da4257557e2e67dacc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 097c45cd9975f7466f9b7c8513681bf8d9cc3d66c074129be950fadffb634d00
mod_ssl-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: cebbebe1ef9d4a58404b416f820be3058fda8de94dd954803dfcc6e5d2d1bcc9
i386
httpd-2.2.15-9.el6_1.3.i686.rpm SHA-256: a8e9058fe499614f3664d20131efaa94a94b79bd67e75eb9505c7e71dcc14f69
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.i686.rpm SHA-256: 340493c08b5faa38d32d9306e5ce497a8ff9478dd731db9c45d08adbc8cbe0f8
mod_ssl-2.2.15-9.el6_1.3.i686.rpm SHA-256: c47324ee8e8b173e1c4e804697ba920015acf340ab52e377330a17ef312c32dc

Red Hat Enterprise Linux Workstation 6

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
x86_64
httpd-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 4aea72fa618286d52f91d2734136e97b84f76e935910c34742d7f29da1ee4333
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-devel-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: dad8001fd57356940a35c043d35e8159f2c4ffb41891a5da4257557e2e67dacc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 097c45cd9975f7466f9b7c8513681bf8d9cc3d66c074129be950fadffb634d00
mod_ssl-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: cebbebe1ef9d4a58404b416f820be3058fda8de94dd954803dfcc6e5d2d1bcc9
i386
httpd-2.2.15-9.el6_1.3.i686.rpm SHA-256: a8e9058fe499614f3664d20131efaa94a94b79bd67e75eb9505c7e71dcc14f69
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.i686.rpm SHA-256: 340493c08b5faa38d32d9306e5ce497a8ff9478dd731db9c45d08adbc8cbe0f8
mod_ssl-2.2.15-9.el6_1.3.i686.rpm SHA-256: c47324ee8e8b173e1c4e804697ba920015acf340ab52e377330a17ef312c32dc

Red Hat Enterprise Linux Desktop 6

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
x86_64
httpd-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 4aea72fa618286d52f91d2734136e97b84f76e935910c34742d7f29da1ee4333
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-devel-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: dad8001fd57356940a35c043d35e8159f2c4ffb41891a5da4257557e2e67dacc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 097c45cd9975f7466f9b7c8513681bf8d9cc3d66c074129be950fadffb634d00
mod_ssl-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: cebbebe1ef9d4a58404b416f820be3058fda8de94dd954803dfcc6e5d2d1bcc9
i386
httpd-2.2.15-9.el6_1.3.i686.rpm SHA-256: a8e9058fe499614f3664d20131efaa94a94b79bd67e75eb9505c7e71dcc14f69
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.i686.rpm SHA-256: 340493c08b5faa38d32d9306e5ce497a8ff9478dd731db9c45d08adbc8cbe0f8
mod_ssl-2.2.15-9.el6_1.3.i686.rpm SHA-256: c47324ee8e8b173e1c4e804697ba920015acf340ab52e377330a17ef312c32dc

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
s390x
httpd-2.2.15-9.el6_1.3.s390x.rpm SHA-256: d40279ad21a6312f7f17abe1c6fa9213c0a33d33f5e08bb93f606ea60dc9cbb8
httpd-debuginfo-2.2.15-9.el6_1.3.s390.rpm SHA-256: c5f5388f4b8be3cd7d7d8cff67525eeb12e81f3ca54d93affa05d4c10e38b4f7
httpd-debuginfo-2.2.15-9.el6_1.3.s390x.rpm SHA-256: 91572903aec5a4001646da8d7c5477734b02ea60c3ed71772c518274c8dabfdd
httpd-devel-2.2.15-9.el6_1.3.s390.rpm SHA-256: 0ba2af723e378840a92285ca1cd95342ac917ac74bf13d54fc722f76920134fb
httpd-devel-2.2.15-9.el6_1.3.s390x.rpm SHA-256: a3a79657300736f045e914def9decdd8ee3b3c3f494ef83f95e648f5405942cc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.s390x.rpm SHA-256: 97f43d052e41bed753f8e39cee96ae403ea68a566d29d671592d80ff043763ef
mod_ssl-2.2.15-9.el6_1.3.s390x.rpm SHA-256: aca9ff2377b30c3663437df315be8226eea59eca5543f8380b18fb2c298b2445

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
s390x
httpd-2.2.15-9.el6_1.3.s390x.rpm SHA-256: d40279ad21a6312f7f17abe1c6fa9213c0a33d33f5e08bb93f606ea60dc9cbb8
httpd-debuginfo-2.2.15-9.el6_1.3.s390.rpm SHA-256: c5f5388f4b8be3cd7d7d8cff67525eeb12e81f3ca54d93affa05d4c10e38b4f7
httpd-debuginfo-2.2.15-9.el6_1.3.s390x.rpm SHA-256: 91572903aec5a4001646da8d7c5477734b02ea60c3ed71772c518274c8dabfdd
httpd-devel-2.2.15-9.el6_1.3.s390.rpm SHA-256: 0ba2af723e378840a92285ca1cd95342ac917ac74bf13d54fc722f76920134fb
httpd-devel-2.2.15-9.el6_1.3.s390x.rpm SHA-256: a3a79657300736f045e914def9decdd8ee3b3c3f494ef83f95e648f5405942cc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.s390x.rpm SHA-256: 97f43d052e41bed753f8e39cee96ae403ea68a566d29d671592d80ff043763ef
mod_ssl-2.2.15-9.el6_1.3.s390x.rpm SHA-256: aca9ff2377b30c3663437df315be8226eea59eca5543f8380b18fb2c298b2445

Red Hat Enterprise Linux for Power, big endian 6

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
ppc64
httpd-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: 63d75b47f4752d1969725860b621817e7d1faf7c829dc23d6ef69b220c2bac22
httpd-debuginfo-2.2.15-9.el6_1.3.ppc.rpm SHA-256: fcceb3b75c517264f5227a6369bafc325ef11d774bdc42dff136eee9ed6f0b50
httpd-debuginfo-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: e1d3082718a76a40e3d5c42de22e2e108d9f891a622a10dc03ffa46d7dbdcffe
httpd-devel-2.2.15-9.el6_1.3.ppc.rpm SHA-256: fa07b8052f5ace785fe4c11494abf2f1ea448b78357d07b80176ec2e65dbb56e
httpd-devel-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: 456af755477c84df6987367b1d25ee2fcb643a04894752a0ac498c7338caaa04
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: 38f82d58eab85c4ea7869c98dce2b5fc87ba491dfdc728184e860b62507cd84e
mod_ssl-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: dea72dfe086c60f825478ce1c7990e37ed3a7756fd23d470683448388f279d0f

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
ppc64
httpd-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: 63d75b47f4752d1969725860b621817e7d1faf7c829dc23d6ef69b220c2bac22
httpd-debuginfo-2.2.15-9.el6_1.3.ppc.rpm SHA-256: fcceb3b75c517264f5227a6369bafc325ef11d774bdc42dff136eee9ed6f0b50
httpd-debuginfo-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: e1d3082718a76a40e3d5c42de22e2e108d9f891a622a10dc03ffa46d7dbdcffe
httpd-devel-2.2.15-9.el6_1.3.ppc.rpm SHA-256: fa07b8052f5ace785fe4c11494abf2f1ea448b78357d07b80176ec2e65dbb56e
httpd-devel-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: 456af755477c84df6987367b1d25ee2fcb643a04894752a0ac498c7338caaa04
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: 38f82d58eab85c4ea7869c98dce2b5fc87ba491dfdc728184e860b62507cd84e
mod_ssl-2.2.15-9.el6_1.3.ppc64.rpm SHA-256: dea72dfe086c60f825478ce1c7990e37ed3a7756fd23d470683448388f279d0f

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
x86_64
httpd-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 4aea72fa618286d52f91d2734136e97b84f76e935910c34742d7f29da1ee4333
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-devel-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: dad8001fd57356940a35c043d35e8159f2c4ffb41891a5da4257557e2e67dacc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 097c45cd9975f7466f9b7c8513681bf8d9cc3d66c074129be950fadffb634d00
mod_ssl-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: cebbebe1ef9d4a58404b416f820be3058fda8de94dd954803dfcc6e5d2d1bcc9

Red Hat Enterprise Linux Server from RHUI 6

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
x86_64
httpd-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 4aea72fa618286d52f91d2734136e97b84f76e935910c34742d7f29da1ee4333
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-devel-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: dad8001fd57356940a35c043d35e8159f2c4ffb41891a5da4257557e2e67dacc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 097c45cd9975f7466f9b7c8513681bf8d9cc3d66c074129be950fadffb634d00
mod_ssl-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: cebbebe1ef9d4a58404b416f820be3058fda8de94dd954803dfcc6e5d2d1bcc9
i386
httpd-2.2.15-9.el6_1.3.i686.rpm SHA-256: a8e9058fe499614f3664d20131efaa94a94b79bd67e75eb9505c7e71dcc14f69
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.i686.rpm SHA-256: 340493c08b5faa38d32d9306e5ce497a8ff9478dd731db9c45d08adbc8cbe0f8
mod_ssl-2.2.15-9.el6_1.3.i686.rpm SHA-256: c47324ee8e8b173e1c4e804697ba920015acf340ab52e377330a17ef312c32dc

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
x86_64
httpd-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 4aea72fa618286d52f91d2734136e97b84f76e935910c34742d7f29da1ee4333
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-debuginfo-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 8db2455ef9eebf2c46edbbb26c6ce834cfa8cddc45bf4cc4f66cfdc09edcd2c0
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-devel-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: dad8001fd57356940a35c043d35e8159f2c4ffb41891a5da4257557e2e67dacc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: 097c45cd9975f7466f9b7c8513681bf8d9cc3d66c074129be950fadffb634d00
mod_ssl-2.2.15-9.el6_1.3.x86_64.rpm SHA-256: cebbebe1ef9d4a58404b416f820be3058fda8de94dd954803dfcc6e5d2d1bcc9
i386
httpd-2.2.15-9.el6_1.3.i686.rpm SHA-256: a8e9058fe499614f3664d20131efaa94a94b79bd67e75eb9505c7e71dcc14f69
httpd-debuginfo-2.2.15-9.el6_1.3.i686.rpm SHA-256: e5c18f5feaf7816c23e098b5a2ab0734f07343ddd0f76db5465619a508df5370
httpd-devel-2.2.15-9.el6_1.3.i686.rpm SHA-256: fc7bcf978672c640972651f957aa86db370c80b63e66d85ac2fff64387b5a31c
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.i686.rpm SHA-256: 340493c08b5faa38d32d9306e5ce497a8ff9478dd731db9c45d08adbc8cbe0f8
mod_ssl-2.2.15-9.el6_1.3.i686.rpm SHA-256: c47324ee8e8b173e1c4e804697ba920015acf340ab52e377330a17ef312c32dc

Red Hat Virtual Storage Appliance (from RHUI) 6.1

SRPM
x86_64

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
httpd-2.2.15-9.el6_1.3.src.rpm SHA-256: 4bf36dd33653251f353c0823f61015e3e92a31615c18b8dc53c31d3c3aa447d4
s390x
httpd-2.2.15-9.el6_1.3.s390x.rpm SHA-256: d40279ad21a6312f7f17abe1c6fa9213c0a33d33f5e08bb93f606ea60dc9cbb8
httpd-debuginfo-2.2.15-9.el6_1.3.s390.rpm SHA-256: c5f5388f4b8be3cd7d7d8cff67525eeb12e81f3ca54d93affa05d4c10e38b4f7
httpd-debuginfo-2.2.15-9.el6_1.3.s390x.rpm SHA-256: 91572903aec5a4001646da8d7c5477734b02ea60c3ed71772c518274c8dabfdd
httpd-devel-2.2.15-9.el6_1.3.s390.rpm SHA-256: 0ba2af723e378840a92285ca1cd95342ac917ac74bf13d54fc722f76920134fb
httpd-devel-2.2.15-9.el6_1.3.s390x.rpm SHA-256: a3a79657300736f045e914def9decdd8ee3b3c3f494ef83f95e648f5405942cc
httpd-manual-2.2.15-9.el6_1.3.noarch.rpm SHA-256: 1e09695995a05002a85c75384bc442d206928a614994a3d31372f397a9b1483e
httpd-tools-2.2.15-9.el6_1.3.s390x.rpm SHA-256: 97f43d052e41bed753f8e39cee96ae403ea68a566d29d671592d80ff043763ef
mod_ssl-2.2.15-9.el6_1.3.s390x.rpm SHA-256: aca9ff2377b30c3663437df315be8226eea59eca5543f8380b18fb2c298b2445

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter