Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:2055 - Security Advisory
Issued:
2016-10-12
Updated:
2016-10-13

RHSA-2016:2055 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat JBoss Enterprise Application Platform 6.4.10 natives update on RHEL 6

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated packages that provide Red Hat JBoss Enterprise Application Platform 6.4.10 natives, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.

This release includes bug fixes and enhancements, as well as a new release of OpenSSL. For further information, see the knowledge base article linked to in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.

Security Fix(es):

  • Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183)
  • It was discovered that it is possible to remotely Segfault Apache http server with a specially crafted string sent to the mod_cluster via service messages (MCMP). (CVE-2016-3110)
  • It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. (CVE-2016-4459)

Red Hat would like to thank Michal Karm Babacek for reporting CVE-2016-3110. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat).

Solution

Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Affected Products

  • JBoss Enterprise Application Platform 6.4 for RHEL 6 x86_64
  • JBoss Enterprise Application Platform 6.4 for RHEL 6 ppc64
  • JBoss Enterprise Application Platform 6.4 for RHEL 6 i386
  • JBoss Enterprise Application Platform 6 for RHEL 6 x86_64
  • JBoss Enterprise Application Platform 6 for RHEL 6 ppc64
  • JBoss Enterprise Application Platform 6 for RHEL 6 i386

Fixes

  • BZ - 1243887 - CVE-2015-3183 httpd: HTTP request smuggling attack against chunked request parser
  • BZ - 1326320 - CVE-2016-3110 mod_cluster: remotely Segfault Apache http server
  • BZ - 1341583 - CVE-2016-4459 mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute
  • BZ - 1345987 - RHEL6 RPMs: Upgrade mod_cluster-native to 1.2.13.Final-redhat-1
  • BZ - 1345991 - RHEL6 RPMs: Upgrade mod_jk to 1.2.41.redhat-1
  • BZ - 1345995 - RHEL6 RPMs: Upgrade tomcat-native to 1.1.34

CVEs

  • CVE-2015-3183
  • CVE-2016-3110
  • CVE-2016-4459

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/articles/2688611
  • https://access.redhat.com/solutions/222023
  • https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html
  • https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Application Platform 6.4 for RHEL 6

SRPM
hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.src.rpm SHA-256: 42a0d006acfd4c4a76cb4e4ca1fe43f78f579fda49539cbf7f7a6508f1f22e3d
httpd-2.2.26-54.ep6.el6.src.rpm SHA-256: 500e2f71d7ec5bfdc3a06bc409c1c153295dc9ac19d3cb94b104dd4636492110
jbcs-httpd24-1-3.jbcs.el6.src.rpm SHA-256: f840b423e0997b74673195a6b2490366e98f09dbe337c0438ccaf80d99bb1a0e
jbcs-httpd24-openssl-1.0.2h-4.jbcs.el6.src.rpm SHA-256: ac5b23430a44667cd0792bb73c6f3c366d4450d6239e7025095bcc72fb165513
mod_cluster-native-1.2.13-3.Final_redhat_2.ep6.el6.src.rpm SHA-256: 13f719c9842b1ff8c1bf8a216599ca2e53cb412fec11035cc83ae20e3fe9ade8
mod_jk-1.2.41-2.redhat_4.ep6.el6.src.rpm SHA-256: 7494c511a9af95e50c283d012125f55281f8f9d88361782902189da719d67db7
tomcat-native-1.1.34-5.redhat_1.ep6.el6.src.rpm SHA-256: f36bf2dafa5e715c97cf1a516f944bb4c6f2b98be1199f15b7508191d100b8ad
x86_64
hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.x86_64.rpm SHA-256: 0d35825de1ca9f8dff9db819a57da22adfd85f3471fef13ffe7db1376a49355d
httpd-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 65a1e179b6e455b73a9aa23929f65fda99c2283cf33e0f6cb96f362efd9b2197
httpd-devel-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 4e5e0e62a3e47307ca75d23e9fb8a97a117163a46d11911e7f926210a86a5a43
httpd-manual-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 8b0470615c47fafc22b9b08eecde0eca9f88371822869e76bbc2935a178a17fa
httpd-tools-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 4aeb4ecadcca0e06707fd6ef87a629067f353061dd4016c2bbe2115e51f00774
jbcs-httpd24-1-3.jbcs.el6.noarch.rpm SHA-256: 4ad48d853b5aa9b54e724c78e144bbde6deeb7a04ae023cf99e7bb04f079f6ff
jbcs-httpd24-openssl-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 86225769181a6677c8ec92ac74db4281b41e73f0a782cb426867a50b6a0289ac
jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 2f558d2b55fa44f8df23471b4d6e2bb67dbf6b05348d2fbe9d414248a93e687d
jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 62186db1184d1a37129d44771eeab73630109c5e3fa54f7d2e38e35ad1a98712
jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 588505e83e4e8d4e75d54b7faa1d4e727159d0a98f83b2dad73b6aa2026bb379
jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 744051dbab7f5ad2d3157fdfa904452f51974219f1d66ca4976012e5142a5719
jbcs-httpd24-runtime-1-3.jbcs.el6.noarch.rpm SHA-256: 8ac86a3df21bd84036eaeedcf6a780bc81d36b74924fc05a308cbb3fc0241865
jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.x86_64.rpm SHA-256: 877874f7e1ffc0924c5fd7d077355532be724b126d9f4b22335087926a91b6df
jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el6.x86_64.rpm SHA-256: e335c3ea451f7f12d4c7810f9c012f16a0bbb17a485a2e0a6267a2dd0336b594
mod_cluster-native-1.2.13-3.Final_redhat_2.ep6.el6.x86_64.rpm SHA-256: e67be895b7a3e8f2eec5211052d2dccb6dfd3323ad9884d4abe520b7c881c537
mod_jk-ap22-1.2.41-2.redhat_4.ep6.el6.x86_64.rpm SHA-256: edeaf9c06eb7ee6fb752c8d58944fcf8357adbeed7dbf26dc8be786104c45e75
mod_ldap-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 704e71dc12b7456d610b8de7132ddfd5a472ff5d7b2d98b636da562f41010864
mod_ssl-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: e345df4f891e8278366a86e5db014d660c8306877aaa3357e9bb6e3af5cab6f4
tomcat-native-1.1.34-5.redhat_1.ep6.el6.x86_64.rpm SHA-256: c66e650acf0a08d8088bec04e59c683358a115185820b1801ca677b7d612f71b
ppc64
hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.ppc64.rpm SHA-256: 46e1fe1e99a7addc91be62ef3ed9aa60106db09341c8308109bd87bb759a0605
httpd-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: e88819d657247afd74a1d9569ca4af85a84bc0ad0c341126b2f31541a2d8f6b3
httpd-devel-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: 9f53a2587de8302faf309bb1f25b87ae55bb140f6b19772007f39707d148523d
httpd-manual-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: 2d64802ded23776cd83f5a9276fd177e9bf1309fb20a951717f9dc7bf9556c20
httpd-tools-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: 81d95ca8234f7734ae118e0951dad5aa96241c20a880913ff1813f7b7dac6274
jbcs-httpd24-1-3.jbcs.el6.noarch.rpm SHA-256: 4ad48d853b5aa9b54e724c78e144bbde6deeb7a04ae023cf99e7bb04f079f6ff
jbcs-httpd24-openssl-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: fb93c148a9e3e636dfe34436b25b07ef4e7ca2630318c2b39eead2892aa34416
jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: 623aa239c016538ee28dd9a48a7997f3affc5e43ec19932fb7f75677f62089f8
jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: bfe0e72169d772e7318e6db41a9f4c31f8af72f11cae22ee54da6a393af96c58
jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: 69336af63ea5062c72cfb2f02bc13ec125e89a6e00040837615fa8fac1454aa1
jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: 7d2bd10540061a83db34359615901bdb39f8a0db1902ba1e6c5baaa5f839394a
jbcs-httpd24-runtime-1-3.jbcs.el6.noarch.rpm SHA-256: 8ac86a3df21bd84036eaeedcf6a780bc81d36b74924fc05a308cbb3fc0241865
jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.ppc64.rpm SHA-256: 7d7b1c4d327e31c6f0775bad4cd36c787aca17720d0038943450d2cfc7f2ef83
jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el6.ppc64.rpm SHA-256: 4b21884a73ca27b0871c1171d2dc272de364a32bd6995c03111d2cd788ae475a
mod_cluster-native-1.2.13-3.Final_redhat_2.ep6.el6.ppc64.rpm SHA-256: a02e41bb0d4478a6c1e13fba4035dcce6aa3cd513fb06a487c18f983824da16a
mod_jk-ap22-1.2.41-2.redhat_4.ep6.el6.ppc64.rpm SHA-256: 3d66976dfafb2d4318bdefc8418c0afbd83dfd6f91e0e57fb96b0f4d64d26387
mod_ldap-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: c91676653409e6e8a06534b7c16ede83858513fc0ed734d4b8bd89a85f568db0
mod_ssl-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: 3b6f84a6765ea1593910ff2cab26f675a3b5e905565be813e797b24eabb7f372
tomcat-native-1.1.34-5.redhat_1.ep6.el6.ppc64.rpm SHA-256: 1df4ed8db1110bbf65192749051d9482c56fa055337f9c0a1117a37018865151
i386
hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.i386.rpm SHA-256: e8056f0ac22b05a5231fd44e89e8a5973977e86fbd36ec965b58b20a5fac49af
httpd-2.2.26-54.ep6.el6.i386.rpm SHA-256: 2ef8cdddf64eee31651657bad31abec8e607dc46b7f4c698351d74a261462d61
httpd-devel-2.2.26-54.ep6.el6.i386.rpm SHA-256: 04722287bb04ab20e50386340906e15279f5acc197ec64adf1ebbc406586e335
httpd-manual-2.2.26-54.ep6.el6.i386.rpm SHA-256: 953df274cb9193c9cab480f8ecd8af48dda6e2d63de6bd4a3dd39e2c0499cd9a
httpd-tools-2.2.26-54.ep6.el6.i386.rpm SHA-256: ea1765628eb3e4d08020227c0506b5b3adfa021b31e774f8879af06921b3ecff
jbcs-httpd24-1-3.jbcs.el6.noarch.rpm SHA-256: 4ad48d853b5aa9b54e724c78e144bbde6deeb7a04ae023cf99e7bb04f079f6ff
jbcs-httpd24-openssl-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: 45b0aad95e6c5e6031e26e36865970c1948cf1a881b0c4e5680468e1a06c49d7
jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: f5ddc2a4bc86f5ec40f932aceeaf4d87eb1c012a300b4e2ffd11bfd2fecd7ba8
jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: ec9f2c353d7f1b3ebbe453ff5eb170304839f6ba4b98d903b1008100e98faa60
jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: e093d1532b16a8ad66a36413fcbfcd0e2b190d555c40308ca70f984cfa35d22d
jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: 4e06824b17e7bfe3a69c968517b2573bb38977b93ed1cc6ec3bd9616ab3c4101
jbcs-httpd24-runtime-1-3.jbcs.el6.noarch.rpm SHA-256: 8ac86a3df21bd84036eaeedcf6a780bc81d36b74924fc05a308cbb3fc0241865
jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.i386.rpm SHA-256: 46b530eeeb0ff03aa08296639d1ee62f23668169b17621168f920f2e792ab4ad
jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el6.i386.rpm SHA-256: a2d3e9e884ef7500c856d4f5a30f563f449375588338a7ae05a5d949492e57f1
mod_cluster-native-1.2.13-3.Final_redhat_2.ep6.el6.i386.rpm SHA-256: ed043fcb58bce264b360afbd457eddfd9039dab8ff491d8f46ccdf567c6e6caf
mod_jk-ap22-1.2.41-2.redhat_4.ep6.el6.i386.rpm SHA-256: 00c0f495520cd745811413ba3eb137f5e886c27d711ece911452941c599e0aba
mod_ldap-2.2.26-54.ep6.el6.i386.rpm SHA-256: 4039a3dacde1c77d1d7ba8a6d055af9e4ea86ef25830c81a298e54059a8d531e
mod_ssl-2.2.26-54.ep6.el6.i386.rpm SHA-256: 2a5fd27067edc19626604ef553a5490f8a7eba49da369c3043d7a4a7c306779e
tomcat-native-1.1.34-5.redhat_1.ep6.el6.i386.rpm SHA-256: d6e7500e9781ff94436a46aec1b0facc37d61429f80bcc9d4696ecfafe7aaac4

JBoss Enterprise Application Platform 6 for RHEL 6

SRPM
hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.src.rpm SHA-256: 42a0d006acfd4c4a76cb4e4ca1fe43f78f579fda49539cbf7f7a6508f1f22e3d
httpd-2.2.26-54.ep6.el6.src.rpm SHA-256: 500e2f71d7ec5bfdc3a06bc409c1c153295dc9ac19d3cb94b104dd4636492110
jbcs-httpd24-1-3.jbcs.el6.src.rpm SHA-256: f840b423e0997b74673195a6b2490366e98f09dbe337c0438ccaf80d99bb1a0e
jbcs-httpd24-openssl-1.0.2h-4.jbcs.el6.src.rpm SHA-256: ac5b23430a44667cd0792bb73c6f3c366d4450d6239e7025095bcc72fb165513
mod_cluster-native-1.2.13-3.Final_redhat_2.ep6.el6.src.rpm SHA-256: 13f719c9842b1ff8c1bf8a216599ca2e53cb412fec11035cc83ae20e3fe9ade8
mod_jk-1.2.41-2.redhat_4.ep6.el6.src.rpm SHA-256: 7494c511a9af95e50c283d012125f55281f8f9d88361782902189da719d67db7
tomcat-native-1.1.34-5.redhat_1.ep6.el6.src.rpm SHA-256: f36bf2dafa5e715c97cf1a516f944bb4c6f2b98be1199f15b7508191d100b8ad
x86_64
hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.x86_64.rpm SHA-256: 0d35825de1ca9f8dff9db819a57da22adfd85f3471fef13ffe7db1376a49355d
httpd-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 65a1e179b6e455b73a9aa23929f65fda99c2283cf33e0f6cb96f362efd9b2197
httpd-devel-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 4e5e0e62a3e47307ca75d23e9fb8a97a117163a46d11911e7f926210a86a5a43
httpd-manual-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 8b0470615c47fafc22b9b08eecde0eca9f88371822869e76bbc2935a178a17fa
httpd-tools-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 4aeb4ecadcca0e06707fd6ef87a629067f353061dd4016c2bbe2115e51f00774
jbcs-httpd24-1-3.jbcs.el6.noarch.rpm SHA-256: 4ad48d853b5aa9b54e724c78e144bbde6deeb7a04ae023cf99e7bb04f079f6ff
jbcs-httpd24-openssl-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 86225769181a6677c8ec92ac74db4281b41e73f0a782cb426867a50b6a0289ac
jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 2f558d2b55fa44f8df23471b4d6e2bb67dbf6b05348d2fbe9d414248a93e687d
jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 62186db1184d1a37129d44771eeab73630109c5e3fa54f7d2e38e35ad1a98712
jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 588505e83e4e8d4e75d54b7faa1d4e727159d0a98f83b2dad73b6aa2026bb379
jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el6.x86_64.rpm SHA-256: 744051dbab7f5ad2d3157fdfa904452f51974219f1d66ca4976012e5142a5719
jbcs-httpd24-runtime-1-3.jbcs.el6.noarch.rpm SHA-256: 8ac86a3df21bd84036eaeedcf6a780bc81d36b74924fc05a308cbb3fc0241865
jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.x86_64.rpm SHA-256: 877874f7e1ffc0924c5fd7d077355532be724b126d9f4b22335087926a91b6df
jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el6.x86_64.rpm SHA-256: e335c3ea451f7f12d4c7810f9c012f16a0bbb17a485a2e0a6267a2dd0336b594
mod_cluster-native-1.2.13-3.Final_redhat_2.ep6.el6.x86_64.rpm SHA-256: e67be895b7a3e8f2eec5211052d2dccb6dfd3323ad9884d4abe520b7c881c537
mod_jk-ap22-1.2.41-2.redhat_4.ep6.el6.x86_64.rpm SHA-256: edeaf9c06eb7ee6fb752c8d58944fcf8357adbeed7dbf26dc8be786104c45e75
mod_ldap-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: 704e71dc12b7456d610b8de7132ddfd5a472ff5d7b2d98b636da562f41010864
mod_ssl-2.2.26-54.ep6.el6.x86_64.rpm SHA-256: e345df4f891e8278366a86e5db014d660c8306877aaa3357e9bb6e3af5cab6f4
tomcat-native-1.1.34-5.redhat_1.ep6.el6.x86_64.rpm SHA-256: c66e650acf0a08d8088bec04e59c683358a115185820b1801ca677b7d612f71b
ppc64
hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.ppc64.rpm SHA-256: 46e1fe1e99a7addc91be62ef3ed9aa60106db09341c8308109bd87bb759a0605
httpd-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: e88819d657247afd74a1d9569ca4af85a84bc0ad0c341126b2f31541a2d8f6b3
httpd-devel-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: 9f53a2587de8302faf309bb1f25b87ae55bb140f6b19772007f39707d148523d
httpd-manual-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: 2d64802ded23776cd83f5a9276fd177e9bf1309fb20a951717f9dc7bf9556c20
httpd-tools-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: 81d95ca8234f7734ae118e0951dad5aa96241c20a880913ff1813f7b7dac6274
jbcs-httpd24-1-3.jbcs.el6.noarch.rpm SHA-256: 4ad48d853b5aa9b54e724c78e144bbde6deeb7a04ae023cf99e7bb04f079f6ff
jbcs-httpd24-openssl-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: fb93c148a9e3e636dfe34436b25b07ef4e7ca2630318c2b39eead2892aa34416
jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: 623aa239c016538ee28dd9a48a7997f3affc5e43ec19932fb7f75677f62089f8
jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: bfe0e72169d772e7318e6db41a9f4c31f8af72f11cae22ee54da6a393af96c58
jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: 69336af63ea5062c72cfb2f02bc13ec125e89a6e00040837615fa8fac1454aa1
jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el6.ppc64.rpm SHA-256: 7d2bd10540061a83db34359615901bdb39f8a0db1902ba1e6c5baaa5f839394a
jbcs-httpd24-runtime-1-3.jbcs.el6.noarch.rpm SHA-256: 8ac86a3df21bd84036eaeedcf6a780bc81d36b74924fc05a308cbb3fc0241865
jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.ppc64.rpm SHA-256: 7d7b1c4d327e31c6f0775bad4cd36c787aca17720d0038943450d2cfc7f2ef83
jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el6.ppc64.rpm SHA-256: 4b21884a73ca27b0871c1171d2dc272de364a32bd6995c03111d2cd788ae475a
mod_cluster-native-1.2.13-3.Final_redhat_2.ep6.el6.ppc64.rpm SHA-256: a02e41bb0d4478a6c1e13fba4035dcce6aa3cd513fb06a487c18f983824da16a
mod_jk-ap22-1.2.41-2.redhat_4.ep6.el6.ppc64.rpm SHA-256: 3d66976dfafb2d4318bdefc8418c0afbd83dfd6f91e0e57fb96b0f4d64d26387
mod_ldap-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: c91676653409e6e8a06534b7c16ede83858513fc0ed734d4b8bd89a85f568db0
mod_ssl-2.2.26-54.ep6.el6.ppc64.rpm SHA-256: 3b6f84a6765ea1593910ff2cab26f675a3b5e905565be813e797b24eabb7f372
tomcat-native-1.1.34-5.redhat_1.ep6.el6.ppc64.rpm SHA-256: 1df4ed8db1110bbf65192749051d9482c56fa055337f9c0a1117a37018865151
i386
hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.i386.rpm SHA-256: e8056f0ac22b05a5231fd44e89e8a5973977e86fbd36ec965b58b20a5fac49af
httpd-2.2.26-54.ep6.el6.i386.rpm SHA-256: 2ef8cdddf64eee31651657bad31abec8e607dc46b7f4c698351d74a261462d61
httpd-devel-2.2.26-54.ep6.el6.i386.rpm SHA-256: 04722287bb04ab20e50386340906e15279f5acc197ec64adf1ebbc406586e335
httpd-manual-2.2.26-54.ep6.el6.i386.rpm SHA-256: 953df274cb9193c9cab480f8ecd8af48dda6e2d63de6bd4a3dd39e2c0499cd9a
httpd-tools-2.2.26-54.ep6.el6.i386.rpm SHA-256: ea1765628eb3e4d08020227c0506b5b3adfa021b31e774f8879af06921b3ecff
jbcs-httpd24-1-3.jbcs.el6.noarch.rpm SHA-256: 4ad48d853b5aa9b54e724c78e144bbde6deeb7a04ae023cf99e7bb04f079f6ff
jbcs-httpd24-openssl-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: 45b0aad95e6c5e6031e26e36865970c1948cf1a881b0c4e5680468e1a06c49d7
jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: f5ddc2a4bc86f5ec40f932aceeaf4d87eb1c012a300b4e2ffd11bfd2fecd7ba8
jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: ec9f2c353d7f1b3ebbe453ff5eb170304839f6ba4b98d903b1008100e98faa60
jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: e093d1532b16a8ad66a36413fcbfcd0e2b190d555c40308ca70f984cfa35d22d
jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el6.i686.rpm SHA-256: 4e06824b17e7bfe3a69c968517b2573bb38977b93ed1cc6ec3bd9616ab3c4101
jbcs-httpd24-runtime-1-3.jbcs.el6.noarch.rpm SHA-256: 8ac86a3df21bd84036eaeedcf6a780bc81d36b74924fc05a308cbb3fc0241865
jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el6.i386.rpm SHA-256: 46b530eeeb0ff03aa08296639d1ee62f23668169b17621168f920f2e792ab4ad
jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el6.i386.rpm SHA-256: a2d3e9e884ef7500c856d4f5a30f563f449375588338a7ae05a5d949492e57f1
mod_cluster-native-1.2.13-3.Final_redhat_2.ep6.el6.i386.rpm SHA-256: ed043fcb58bce264b360afbd457eddfd9039dab8ff491d8f46ccdf567c6e6caf
mod_jk-ap22-1.2.41-2.redhat_4.ep6.el6.i386.rpm SHA-256: 00c0f495520cd745811413ba3eb137f5e886c27d711ece911452941c599e0aba
mod_ldap-2.2.26-54.ep6.el6.i386.rpm SHA-256: 4039a3dacde1c77d1d7ba8a6d055af9e4ea86ef25830c81a298e54059a8d531e
mod_ssl-2.2.26-54.ep6.el6.i386.rpm SHA-256: 2a5fd27067edc19626604ef553a5490f8a7eba49da369c3043d7a4a7c306779e
tomcat-native-1.1.34-5.redhat_1.ep6.el6.i386.rpm SHA-256: d6e7500e9781ff94436a46aec1b0facc37d61429f80bcc9d4696ecfafe7aaac4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility