Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2013:0512 - Security Advisory
Issued:
2013-02-21
Updated:
2013-02-21

RHSA-2013:0512 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: httpd security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The httpd packages contain the Apache HTTP Server (httpd), which is the
namesake project of The Apache Software Foundation.

An input sanitization flaw was found in the mod_negotiation Apache HTTP
Server module. A remote attacker able to upload or create files with
arbitrary names in a directory that has the MultiViews options enabled,
could use this flaw to conduct cross-site scripting attacks against users
visiting the site. (CVE-2008-0455, CVE-2012-2687)

It was discovered that mod_proxy_ajp, when used in configurations with
mod_proxy in load balancer mode, would mark a back-end server as failed
when request processing timed out, even when a previous AJP (Apache JServ
Protocol) CPing request was responded to by the back-end. A remote
attacker able to make a back-end use an excessive amount of time to
process a request could cause mod_proxy to not send requests to back-end
AJP servers for the retry timeout period or until all back-end servers
were marked as failed. (CVE-2012-4557)

These updated httpd packages include numerous bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Users
are directed to the Red Hat Enterprise Linux 6.4 Technical Notes, linked
to in the References, for information on the most significant of these
changes.

All users of httpd are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements. After installing the updated packages, the httpd daemon will
be restarted automatically.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 757735 - [RFE] httpd's rotatelogs needs a way to rotate files into a custom location
  • BZ - 757739 - [RFE] rotatelogs needs to create files even if they are empty
  • BZ - 805720 - Only a single interface is available for SSL
  • BZ - 805810 - init script for htcacheclean is missing
  • BZ - 828896 - mod_authnz_ldap unable to set environment variables for authorize only
  • BZ - 829689 - mod_ldap: fix occasional 500 Internal Server Error
  • BZ - 842376 - httpd fails in processing chunked requests with > 31 bytes chunk-size / -extension line
  • BZ - 848954 - Putting private key first in SSLProxyMachineCertificateFile causes segfault
  • BZ - 850794 - CVE-2012-2687 CVE-2008-0455 httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled
  • BZ - 867745 - mod_ssl post install script can cause failures
  • BZ - 868283 - mod_cache regression in httpd 2.2.3-65: non-cacheable 304 responses serve bad data
  • BZ - 871685 - CVE-2012-4557 httpd: mod_proxy_ajp worker moved to error state when timeout exceeded
  • BZ - 876923 - "if" condition always true - detected by Coverity

CVEs

  • CVE-2012-4557
  • CVE-2008-0455
  • CVE-2012-2687

References

  • https://access.redhat.com/security/updates/classification/#low
  • https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/httpd.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
httpd-2.2.15-26.el6.src.rpm SHA-256: 7c877a78c7f45f2673e2a7be5da08e08de71315da7b34f24a1cd34cf7041e5fc
x86_64
httpd-2.2.15-26.el6.x86_64.rpm SHA-256: 67133074bb9f85a2303667ab962908f4441514ffed640fca35d2d987d2669287
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-debuginfo-2.2.15-26.el6.x86_64.rpm SHA-256: 0c397b775d45df87f76b41eda9a1aa07165becd0cc9b5457fbc4e1ea54d68df7
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-devel-2.2.15-26.el6.x86_64.rpm SHA-256: 7f2c8bd30d2629964fd1783fd03f1abc714841213edc6c166410566db7046499
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.x86_64.rpm SHA-256: 5d6b0fb362f50deacb244d18b93bba75c623451dcbf7fced0d0d4d925d09b33a
mod_ssl-2.2.15-26.el6.x86_64.rpm SHA-256: 07fd83a406c54017bdf42b9265214c6023d89ec316fad53bd87727d4f9183e13
i386
httpd-2.2.15-26.el6.i686.rpm SHA-256: e3978ed1e3758802a1a74623e42c8f05a6d76495db4ed2f3b533415bf7630fe8
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.i686.rpm SHA-256: ccd1df671153dfa7c3ce5523cb17e9668d71c84e986666a754b553e2ee215f31
mod_ssl-2.2.15-26.el6.i686.rpm SHA-256: 20f840aab34a9d4f53835e02c8ca9bac77b03418481d5912996cf76e6fd96c2a

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
httpd-2.2.15-26.el6.src.rpm SHA-256: 7c877a78c7f45f2673e2a7be5da08e08de71315da7b34f24a1cd34cf7041e5fc
x86_64
httpd-2.2.15-26.el6.x86_64.rpm SHA-256: 67133074bb9f85a2303667ab962908f4441514ffed640fca35d2d987d2669287
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-debuginfo-2.2.15-26.el6.x86_64.rpm SHA-256: 0c397b775d45df87f76b41eda9a1aa07165becd0cc9b5457fbc4e1ea54d68df7
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-devel-2.2.15-26.el6.x86_64.rpm SHA-256: 7f2c8bd30d2629964fd1783fd03f1abc714841213edc6c166410566db7046499
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.x86_64.rpm SHA-256: 5d6b0fb362f50deacb244d18b93bba75c623451dcbf7fced0d0d4d925d09b33a
mod_ssl-2.2.15-26.el6.x86_64.rpm SHA-256: 07fd83a406c54017bdf42b9265214c6023d89ec316fad53bd87727d4f9183e13
i386
httpd-2.2.15-26.el6.i686.rpm SHA-256: e3978ed1e3758802a1a74623e42c8f05a6d76495db4ed2f3b533415bf7630fe8
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.i686.rpm SHA-256: ccd1df671153dfa7c3ce5523cb17e9668d71c84e986666a754b553e2ee215f31
mod_ssl-2.2.15-26.el6.i686.rpm SHA-256: 20f840aab34a9d4f53835e02c8ca9bac77b03418481d5912996cf76e6fd96c2a

Red Hat Enterprise Linux Workstation 6

SRPM
httpd-2.2.15-26.el6.src.rpm SHA-256: 7c877a78c7f45f2673e2a7be5da08e08de71315da7b34f24a1cd34cf7041e5fc
x86_64
httpd-2.2.15-26.el6.x86_64.rpm SHA-256: 67133074bb9f85a2303667ab962908f4441514ffed640fca35d2d987d2669287
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-debuginfo-2.2.15-26.el6.x86_64.rpm SHA-256: 0c397b775d45df87f76b41eda9a1aa07165becd0cc9b5457fbc4e1ea54d68df7
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-devel-2.2.15-26.el6.x86_64.rpm SHA-256: 7f2c8bd30d2629964fd1783fd03f1abc714841213edc6c166410566db7046499
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.x86_64.rpm SHA-256: 5d6b0fb362f50deacb244d18b93bba75c623451dcbf7fced0d0d4d925d09b33a
mod_ssl-2.2.15-26.el6.x86_64.rpm SHA-256: 07fd83a406c54017bdf42b9265214c6023d89ec316fad53bd87727d4f9183e13
i386
httpd-2.2.15-26.el6.i686.rpm SHA-256: e3978ed1e3758802a1a74623e42c8f05a6d76495db4ed2f3b533415bf7630fe8
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.i686.rpm SHA-256: ccd1df671153dfa7c3ce5523cb17e9668d71c84e986666a754b553e2ee215f31
mod_ssl-2.2.15-26.el6.i686.rpm SHA-256: 20f840aab34a9d4f53835e02c8ca9bac77b03418481d5912996cf76e6fd96c2a

Red Hat Enterprise Linux Desktop 6

SRPM
httpd-2.2.15-26.el6.src.rpm SHA-256: 7c877a78c7f45f2673e2a7be5da08e08de71315da7b34f24a1cd34cf7041e5fc
x86_64
httpd-2.2.15-26.el6.x86_64.rpm SHA-256: 67133074bb9f85a2303667ab962908f4441514ffed640fca35d2d987d2669287
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-debuginfo-2.2.15-26.el6.x86_64.rpm SHA-256: 0c397b775d45df87f76b41eda9a1aa07165becd0cc9b5457fbc4e1ea54d68df7
httpd-debuginfo-2.2.15-26.el6.x86_64.rpm SHA-256: 0c397b775d45df87f76b41eda9a1aa07165becd0cc9b5457fbc4e1ea54d68df7
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-devel-2.2.15-26.el6.x86_64.rpm SHA-256: 7f2c8bd30d2629964fd1783fd03f1abc714841213edc6c166410566db7046499
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.x86_64.rpm SHA-256: 5d6b0fb362f50deacb244d18b93bba75c623451dcbf7fced0d0d4d925d09b33a
mod_ssl-2.2.15-26.el6.x86_64.rpm SHA-256: 07fd83a406c54017bdf42b9265214c6023d89ec316fad53bd87727d4f9183e13
i386
httpd-2.2.15-26.el6.i686.rpm SHA-256: e3978ed1e3758802a1a74623e42c8f05a6d76495db4ed2f3b533415bf7630fe8
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.i686.rpm SHA-256: ccd1df671153dfa7c3ce5523cb17e9668d71c84e986666a754b553e2ee215f31
mod_ssl-2.2.15-26.el6.i686.rpm SHA-256: 20f840aab34a9d4f53835e02c8ca9bac77b03418481d5912996cf76e6fd96c2a

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
httpd-2.2.15-26.el6.src.rpm SHA-256: 7c877a78c7f45f2673e2a7be5da08e08de71315da7b34f24a1cd34cf7041e5fc
s390x
httpd-2.2.15-26.el6.s390x.rpm SHA-256: dee5fc091ff03f3864befbeba355c261653f4281d514d97424cdd14eb1c91c38
httpd-debuginfo-2.2.15-26.el6.s390.rpm SHA-256: 54ffa10450f9e81a6583243e76edad7263e2123444d4655369b79b1ac4eac094
httpd-debuginfo-2.2.15-26.el6.s390x.rpm SHA-256: bf417f33cfea53f53dec08e75bd207042cb588f6bf7d20cd0e1ac6b249084d7e
httpd-devel-2.2.15-26.el6.s390.rpm SHA-256: 55ad66b9b93de21874de6452e728aa631d2a9a47265e038ba07218a2d56791d3
httpd-devel-2.2.15-26.el6.s390x.rpm SHA-256: 464043c72417d68a24ac5a181b25ff73bcd12a3b4767669d05588fed091bfe68
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.s390x.rpm SHA-256: 7493586ca9f93584518ed489726937e780fe76b170f53505c1c43b30e4538f8e
mod_ssl-2.2.15-26.el6.s390x.rpm SHA-256: f7633403460384880a954a11a5574f48201a469ce78ff32aaa01e59878c34e07

Red Hat Enterprise Linux for Power, big endian 6

SRPM
httpd-2.2.15-26.el6.src.rpm SHA-256: 7c877a78c7f45f2673e2a7be5da08e08de71315da7b34f24a1cd34cf7041e5fc
ppc64
httpd-2.2.15-26.el6.ppc64.rpm SHA-256: 530b819bedb980523482e59f4775160e5291c6420ff175df63f580f3857d1ad8
httpd-debuginfo-2.2.15-26.el6.ppc.rpm SHA-256: 8b0ed06cfb6442b60bee84aa68bddd67e3956c118326e975bda89c17747f7053
httpd-debuginfo-2.2.15-26.el6.ppc64.rpm SHA-256: d7b4f5974cb4337b191f65791c9d5037ea89b7f53681bfec618aa6011a8d5c14
httpd-devel-2.2.15-26.el6.ppc.rpm SHA-256: 0926aad6bb563299158a9dded583a486c654a583b5368cbcdabbe323df95d11e
httpd-devel-2.2.15-26.el6.ppc64.rpm SHA-256: 7e0b7ff0cf8ca5b0827ff316da2800bba5b14b1dc01d3b5d5bf0f304e986d551
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.ppc64.rpm SHA-256: 282e23438c09b9aa3b2f993d85365b9e99b3af89d5c6611a11959c43b2a995bc
mod_ssl-2.2.15-26.el6.ppc64.rpm SHA-256: 8db0cc0a174885e8f7d2d68814622777869f59390a298a045b91bb29d7c8a143

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
httpd-2.2.15-26.el6.src.rpm SHA-256: 7c877a78c7f45f2673e2a7be5da08e08de71315da7b34f24a1cd34cf7041e5fc
x86_64
httpd-2.2.15-26.el6.x86_64.rpm SHA-256: 67133074bb9f85a2303667ab962908f4441514ffed640fca35d2d987d2669287
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-debuginfo-2.2.15-26.el6.x86_64.rpm SHA-256: 0c397b775d45df87f76b41eda9a1aa07165becd0cc9b5457fbc4e1ea54d68df7
httpd-debuginfo-2.2.15-26.el6.x86_64.rpm SHA-256: 0c397b775d45df87f76b41eda9a1aa07165becd0cc9b5457fbc4e1ea54d68df7
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-devel-2.2.15-26.el6.x86_64.rpm SHA-256: 7f2c8bd30d2629964fd1783fd03f1abc714841213edc6c166410566db7046499
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.x86_64.rpm SHA-256: 5d6b0fb362f50deacb244d18b93bba75c623451dcbf7fced0d0d4d925d09b33a
mod_ssl-2.2.15-26.el6.x86_64.rpm SHA-256: 07fd83a406c54017bdf42b9265214c6023d89ec316fad53bd87727d4f9183e13

Red Hat Enterprise Linux Server from RHUI 6

SRPM
httpd-2.2.15-26.el6.src.rpm SHA-256: 7c877a78c7f45f2673e2a7be5da08e08de71315da7b34f24a1cd34cf7041e5fc
x86_64
httpd-2.2.15-26.el6.x86_64.rpm SHA-256: 67133074bb9f85a2303667ab962908f4441514ffed640fca35d2d987d2669287
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-debuginfo-2.2.15-26.el6.x86_64.rpm SHA-256: 0c397b775d45df87f76b41eda9a1aa07165becd0cc9b5457fbc4e1ea54d68df7
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-devel-2.2.15-26.el6.x86_64.rpm SHA-256: 7f2c8bd30d2629964fd1783fd03f1abc714841213edc6c166410566db7046499
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.x86_64.rpm SHA-256: 5d6b0fb362f50deacb244d18b93bba75c623451dcbf7fced0d0d4d925d09b33a
mod_ssl-2.2.15-26.el6.x86_64.rpm SHA-256: 07fd83a406c54017bdf42b9265214c6023d89ec316fad53bd87727d4f9183e13
i386
httpd-2.2.15-26.el6.i686.rpm SHA-256: e3978ed1e3758802a1a74623e42c8f05a6d76495db4ed2f3b533415bf7630fe8
httpd-debuginfo-2.2.15-26.el6.i686.rpm SHA-256: 74525d2b91feb5d828efc9a5857eb797bf2b1f8df352bf767e1d2b530fcf44ab
httpd-devel-2.2.15-26.el6.i686.rpm SHA-256: e7c2abde75e911864d076444f8030e2a74eb980c16e52fa531024b8b0cd3de76
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.i686.rpm SHA-256: ccd1df671153dfa7c3ce5523cb17e9668d71c84e986666a754b553e2ee215f31
mod_ssl-2.2.15-26.el6.i686.rpm SHA-256: 20f840aab34a9d4f53835e02c8ca9bac77b03418481d5912996cf76e6fd96c2a

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
httpd-2.2.15-26.el6.src.rpm SHA-256: 7c877a78c7f45f2673e2a7be5da08e08de71315da7b34f24a1cd34cf7041e5fc
s390x
httpd-2.2.15-26.el6.s390x.rpm SHA-256: dee5fc091ff03f3864befbeba355c261653f4281d514d97424cdd14eb1c91c38
httpd-debuginfo-2.2.15-26.el6.s390.rpm SHA-256: 54ffa10450f9e81a6583243e76edad7263e2123444d4655369b79b1ac4eac094
httpd-debuginfo-2.2.15-26.el6.s390x.rpm SHA-256: bf417f33cfea53f53dec08e75bd207042cb588f6bf7d20cd0e1ac6b249084d7e
httpd-devel-2.2.15-26.el6.s390.rpm SHA-256: 55ad66b9b93de21874de6452e728aa631d2a9a47265e038ba07218a2d56791d3
httpd-devel-2.2.15-26.el6.s390x.rpm SHA-256: 464043c72417d68a24ac5a181b25ff73bcd12a3b4767669d05588fed091bfe68
httpd-manual-2.2.15-26.el6.noarch.rpm SHA-256: 2933890645bbec722fa5504c7e6706c847fa9fa4fdd494bccc861bcbfd795252
httpd-tools-2.2.15-26.el6.s390x.rpm SHA-256: 7493586ca9f93584518ed489726937e780fe76b170f53505c1c43b30e4538f8e
mod_ssl-2.2.15-26.el6.s390x.rpm SHA-256: f7633403460384880a954a11a5574f48201a469ce78ff32aaa01e59878c34e07

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter