Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:0128 - Security Advisory
Issued:
2012-02-13
Updated:
2012-02-13

RHSA-2012:0128 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: httpd security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The Apache HTTP Server is a popular web server.

It was discovered that the fix for CVE-2011-3368 (released via
RHSA-2011:1391) did not completely address the problem. An attacker could
bypass the fix and make a reverse proxy connect to an arbitrary server not
directly accessible to the attacker by sending an HTTP version 0.9 request,
or by using a specially-crafted URI. (CVE-2011-3639, CVE-2011-4317)

The httpd server included the full HTTP header line in the default error
page generated when receiving an excessively long or malformed header.
Malicious JavaScript running in the server's domain context could use this
flaw to gain access to httpOnly cookies. (CVE-2012-0053)

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way httpd performed substitutions in regular expressions. An
attacker able to set certain httpd settings, such as a user permitted to
override the httpd configuration for a specific directory using a
".htaccess" file, could use this flaw to crash the httpd child process or,
possibly, execute arbitrary code with the privileges of the "apache" user.
(CVE-2011-3607)

A flaw was found in the way httpd handled child process status information.
A malicious program running with httpd child process privileges (such as a
PHP or CGI script) could use this flaw to cause the parent httpd process to
crash during httpd service shutdown. (CVE-2012-0031)

All httpd users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, the httpd daemon will be restarted automatically.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 i386
  • Red Hat Storage 2.0 x86_64
  • Red Hat Gluster Storage Server for On-premise 2.0 x86_64
  • Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64
  • Red Hat Enterprise Linux Server - AUS 6.2 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 752080 - CVE-2011-3639 httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix
  • BZ - 756483 - CVE-2011-4317 httpd: uri scheme bypass of the reverse proxy vulnerability CVE-2011-3368 fix
  • BZ - 769844 - CVE-2011-3607 httpd: ap_pregsub Integer overflow to buffer overflow
  • BZ - 773744 - CVE-2012-0031 httpd: possible crash on shutdown due to flaw in scoreboard handling
  • BZ - 785069 - CVE-2012-0053 httpd: cookie exposure due to error responses

CVEs

  • CVE-2011-4317
  • CVE-2011-3607
  • CVE-2011-3639
  • CVE-2012-0053
  • CVE-2012-0031

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://rhn.redhat.com/errata/RHSA-2011-1391.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54
i386
httpd-2.2.15-15.el6_2.1.i686.rpm SHA-256: b36326067e33206040712474456e31e21660d77c0cdaf0c76b37ab27838a0612
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.i686.rpm SHA-256: 79358dfff6d4679923f72bbe0ac8a1053b3bc7d8ac62c7d3aa512f3e659a8e23
mod_ssl-2.2.15-15.el6_2.1.i686.rpm SHA-256: 3e29d654f72d91caa307c77d50e840589f2169693dd4123a5585631ffadb3ae9

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54
i386
httpd-2.2.15-15.el6_2.1.i686.rpm SHA-256: b36326067e33206040712474456e31e21660d77c0cdaf0c76b37ab27838a0612
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.i686.rpm SHA-256: 79358dfff6d4679923f72bbe0ac8a1053b3bc7d8ac62c7d3aa512f3e659a8e23
mod_ssl-2.2.15-15.el6_2.1.i686.rpm SHA-256: 3e29d654f72d91caa307c77d50e840589f2169693dd4123a5585631ffadb3ae9

Red Hat Enterprise Linux Workstation 6

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54
i386
httpd-2.2.15-15.el6_2.1.i686.rpm SHA-256: b36326067e33206040712474456e31e21660d77c0cdaf0c76b37ab27838a0612
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.i686.rpm SHA-256: 79358dfff6d4679923f72bbe0ac8a1053b3bc7d8ac62c7d3aa512f3e659a8e23
mod_ssl-2.2.15-15.el6_2.1.i686.rpm SHA-256: 3e29d654f72d91caa307c77d50e840589f2169693dd4123a5585631ffadb3ae9

Red Hat Enterprise Linux Desktop 6

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
i386
httpd-2.2.15-15.el6_2.1.i686.rpm SHA-256: b36326067e33206040712474456e31e21660d77c0cdaf0c76b37ab27838a0612
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.i686.rpm SHA-256: 79358dfff6d4679923f72bbe0ac8a1053b3bc7d8ac62c7d3aa512f3e659a8e23
mod_ssl-2.2.15-15.el6_2.1.i686.rpm SHA-256: 3e29d654f72d91caa307c77d50e840589f2169693dd4123a5585631ffadb3ae9
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
s390x
httpd-2.2.15-15.el6_2.1.s390x.rpm SHA-256: 36f10f2cd3be41c404e095595b7c5b56eea2ba37a81cd8422f9261c237d29dc2
httpd-debuginfo-2.2.15-15.el6_2.1.s390.rpm SHA-256: 6bc9eba5032c24e2917d007c0cc6d9ab3771a6eeed1f7ab100808a5ce5cb9bbe
httpd-debuginfo-2.2.15-15.el6_2.1.s390x.rpm SHA-256: 0af4ab5c5d4f96858116b81629d248e8af0dcdcd2c1120b8f7e5a6013742d27a
httpd-devel-2.2.15-15.el6_2.1.s390.rpm SHA-256: 218881ff00bd4686dadaa8c999b04a9d3874d1857b8e06d5c73a60c984196904
httpd-devel-2.2.15-15.el6_2.1.s390x.rpm SHA-256: 8c3d4b64a1d49c893d017538a3cd9a6e827b9dc48a3290a10d1fdf99e6cbef2d
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.s390x.rpm SHA-256: e6834dbc8032549a0737261f0e26a7b4e006223b0df4f6a24acfdeb4897e11fa
mod_ssl-2.2.15-15.el6_2.1.s390x.rpm SHA-256: f65305b5e3b6b9fb3a9c8ae5685d5a21cd53c3f313c25e77ff30ffc6700fbec4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
s390x
httpd-2.2.15-15.el6_2.1.s390x.rpm SHA-256: 36f10f2cd3be41c404e095595b7c5b56eea2ba37a81cd8422f9261c237d29dc2
httpd-debuginfo-2.2.15-15.el6_2.1.s390.rpm SHA-256: 6bc9eba5032c24e2917d007c0cc6d9ab3771a6eeed1f7ab100808a5ce5cb9bbe
httpd-debuginfo-2.2.15-15.el6_2.1.s390x.rpm SHA-256: 0af4ab5c5d4f96858116b81629d248e8af0dcdcd2c1120b8f7e5a6013742d27a
httpd-devel-2.2.15-15.el6_2.1.s390.rpm SHA-256: 218881ff00bd4686dadaa8c999b04a9d3874d1857b8e06d5c73a60c984196904
httpd-devel-2.2.15-15.el6_2.1.s390x.rpm SHA-256: 8c3d4b64a1d49c893d017538a3cd9a6e827b9dc48a3290a10d1fdf99e6cbef2d
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.s390x.rpm SHA-256: e6834dbc8032549a0737261f0e26a7b4e006223b0df4f6a24acfdeb4897e11fa
mod_ssl-2.2.15-15.el6_2.1.s390x.rpm SHA-256: f65305b5e3b6b9fb3a9c8ae5685d5a21cd53c3f313c25e77ff30ffc6700fbec4

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54

Red Hat Enterprise Linux Server from RHUI 6

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54
i386
httpd-2.2.15-15.el6_2.1.i686.rpm SHA-256: b36326067e33206040712474456e31e21660d77c0cdaf0c76b37ab27838a0612
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.i686.rpm SHA-256: 79358dfff6d4679923f72bbe0ac8a1053b3bc7d8ac62c7d3aa512f3e659a8e23
mod_ssl-2.2.15-15.el6_2.1.i686.rpm SHA-256: 3e29d654f72d91caa307c77d50e840589f2169693dd4123a5585631ffadb3ae9

Red Hat Storage 2.0

SRPM
x86_64

Red Hat Gluster Storage Server for On-premise 2.0

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54

Red Hat Enterprise Linux Server - AUS 6.2

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54
i386
httpd-2.2.15-15.el6_2.1.i686.rpm SHA-256: b36326067e33206040712474456e31e21660d77c0cdaf0c76b37ab27838a0612
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.i686.rpm SHA-256: 79358dfff6d4679923f72bbe0ac8a1053b3bc7d8ac62c7d3aa512f3e659a8e23
mod_ssl-2.2.15-15.el6_2.1.i686.rpm SHA-256: 3e29d654f72d91caa307c77d50e840589f2169693dd4123a5585631ffadb3ae9

Red Hat Enterprise Linux for Power, big endian 6

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
ppc64
httpd-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: 6002669eeb995498db95f060ec24551fb770ac39c7b85dbe284802b0d2b07a4e
httpd-debuginfo-2.2.15-15.el6_2.1.ppc.rpm SHA-256: 4526f02d074dac08171bf6854d6778f771fb9893118038d291ed5da55d80f48e
httpd-debuginfo-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: f2dccd01d2352ce334dd20d1f016bf175b9c5dc31ae70e184f45ecce7ee9e857
httpd-devel-2.2.15-15.el6_2.1.ppc.rpm SHA-256: 695f42330df61b3e80902e6c5a458727f54dfec40eaaa46bfc50295f2b913bf3
httpd-devel-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: 6d6c11400f630b080c58e9185aed1323743963dddb87e6476641e755cc98281c
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: 8530b8c3c5f9e0c7c904c7a8489f08a2404ac13afea23ca54c23829d0438abc0
mod_ssl-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: 0d78da7a53af46c2b74c3c69ebc04e529fcf13f7cec5ff2aa5829279b3040009

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
ppc64
httpd-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: 6002669eeb995498db95f060ec24551fb770ac39c7b85dbe284802b0d2b07a4e
httpd-debuginfo-2.2.15-15.el6_2.1.ppc.rpm SHA-256: 4526f02d074dac08171bf6854d6778f771fb9893118038d291ed5da55d80f48e
httpd-debuginfo-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: f2dccd01d2352ce334dd20d1f016bf175b9c5dc31ae70e184f45ecce7ee9e857
httpd-devel-2.2.15-15.el6_2.1.ppc.rpm SHA-256: 695f42330df61b3e80902e6c5a458727f54dfec40eaaa46bfc50295f2b913bf3
httpd-devel-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: 6d6c11400f630b080c58e9185aed1323743963dddb87e6476641e755cc98281c
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: 8530b8c3c5f9e0c7c904c7a8489f08a2404ac13afea23ca54c23829d0438abc0
mod_ssl-2.2.15-15.el6_2.1.ppc64.rpm SHA-256: 0d78da7a53af46c2b74c3c69ebc04e529fcf13f7cec5ff2aa5829279b3040009

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54
i386
httpd-2.2.15-15.el6_2.1.i686.rpm SHA-256: b36326067e33206040712474456e31e21660d77c0cdaf0c76b37ab27838a0612
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.i686.rpm SHA-256: 79358dfff6d4679923f72bbe0ac8a1053b3bc7d8ac62c7d3aa512f3e659a8e23
mod_ssl-2.2.15-15.el6_2.1.i686.rpm SHA-256: 3e29d654f72d91caa307c77d50e840589f2169693dd4123a5585631ffadb3ae9

Red Hat Storage for Public Cloud (via RHUI) 2.0

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
x86_64
httpd-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 54cf423d9312069cdc33566e47b423f2b7bbeeb93d5297b6f5e38efffbabff66
httpd-debuginfo-2.2.15-15.el6_2.1.i686.rpm SHA-256: 8e9e178dabe916b63b28958ad87b3f60fa5a6cdfdaad09791d25aea16d62f8a5
httpd-debuginfo-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: c78bc6c2d252246be9b6f25ff68b81968b42e50f1b440622c44fe1de64081b68
httpd-devel-2.2.15-15.el6_2.1.i686.rpm SHA-256: fa66425b05b4852759de647dc84ee5c0d483b17c317ec4d959ba9009db2ffd53
httpd-devel-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 6ba1734770a96737b15918a9dea802ec0d014d19b8510ca91974c404dbc9d2ec
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: 696aa73d033fabccaaa6459b2de8643adeff0fd8db0b63bced4dd0b3224941dc
mod_ssl-2.2.15-15.el6_2.1.x86_64.rpm SHA-256: cd3792a519d61aba16dca745d6ae542b13c7db29cd5b9c1082e6e8217920be54

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
httpd-2.2.15-15.el6_2.1.src.rpm SHA-256: 21b1d2ddaf6b55f871c24481b9f27d64dda06feb16268189f34700a4306c967c
s390x
httpd-2.2.15-15.el6_2.1.s390x.rpm SHA-256: 36f10f2cd3be41c404e095595b7c5b56eea2ba37a81cd8422f9261c237d29dc2
httpd-debuginfo-2.2.15-15.el6_2.1.s390.rpm SHA-256: 6bc9eba5032c24e2917d007c0cc6d9ab3771a6eeed1f7ab100808a5ce5cb9bbe
httpd-debuginfo-2.2.15-15.el6_2.1.s390x.rpm SHA-256: 0af4ab5c5d4f96858116b81629d248e8af0dcdcd2c1120b8f7e5a6013742d27a
httpd-devel-2.2.15-15.el6_2.1.s390.rpm SHA-256: 218881ff00bd4686dadaa8c999b04a9d3874d1857b8e06d5c73a60c984196904
httpd-devel-2.2.15-15.el6_2.1.s390x.rpm SHA-256: 8c3d4b64a1d49c893d017538a3cd9a6e827b9dc48a3290a10d1fdf99e6cbef2d
httpd-manual-2.2.15-15.el6_2.1.noarch.rpm SHA-256: 0b529221216a0cb45c6a4e02140336ca69e0e4a5ae6afaf15c02c8625076645b
httpd-tools-2.2.15-15.el6_2.1.s390x.rpm SHA-256: e6834dbc8032549a0737261f0e26a7b4e006223b0df4f6a24acfdeb4897e11fa
mod_ssl-2.2.15-15.el6_2.1.s390x.rpm SHA-256: f65305b5e3b6b9fb3a9c8ae5685d5a21cd53c3f313c25e77ff30ffc6700fbec4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter