Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:3958 - Security Advisory
Issued:
2020-09-29
Updated:
2020-09-29

RHSA-2020:3958 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: httpd security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for httpd is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

  • httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications (CVE-2018-1283)
  • httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS (CVE-2018-1303)
  • httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927)
  • httpd: <FilesMatch> bypass with a trailing newline in the file name (CVE-2017-15715)
  • httpd: mod_rewrite potential open redirect (CVE-2019-10098)
  • httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le

Fixes

  • BZ - 1560395 - CVE-2018-1283 httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications
  • BZ - 1560399 - CVE-2018-1303 httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS
  • BZ - 1560614 - CVE-2017-15715 httpd: <FilesMatch> bypass with a trailing newline in the file name
  • BZ - 1715981 - Backport of SessionExpiryUpdateInterval directive
  • BZ - 1724879 - httpd terminates all SSL connections using an abortive shutdown
  • BZ - 1743959 - CVE-2019-10098 httpd: mod_rewrite potential open redirect
  • BZ - 1820761 - CVE-2020-1927 httpd: mod_rewrite configurations vulnerable to open redirect
  • BZ - 1820772 - CVE-2020-1934 httpd: mod_proxy_ftp use of uninitialized value

CVEs

  • CVE-2017-15715
  • CVE-2018-1283
  • CVE-2018-1303
  • CVE-2019-10098
  • CVE-2020-1927
  • CVE-2020-1934

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
x86_64
httpd-2.4.6-95.el7.x86_64.rpm SHA-256: e7740953ec62a37a4222ae8fca055502d0477f640930ec0c03d6464f9ae0f500
httpd-debuginfo-2.4.6-95.el7.x86_64.rpm SHA-256: 46a46ee1951ca6d9145214a283f10ae66fdecb33ec4cf7f321c7129ac4b70511
httpd-debuginfo-2.4.6-95.el7.x86_64.rpm SHA-256: 46a46ee1951ca6d9145214a283f10ae66fdecb33ec4cf7f321c7129ac4b70511
httpd-devel-2.4.6-95.el7.x86_64.rpm SHA-256: 12775caf7c8ba029a7a4e90c3dcacfe93b9dccfd45d688a889fee17899db9243
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.x86_64.rpm SHA-256: ea607dcd9268fdab394848bc0a25743f22c31676e5ebfc30a1c42c47c5aa7e89
mod_ldap-2.4.6-95.el7.x86_64.rpm SHA-256: bb946b2b2f81d322c77cfbedd28573147412921456fe207bf649f7466b36672e
mod_proxy_html-2.4.6-95.el7.x86_64.rpm SHA-256: 83b9dd071afe046d519742199d6c559bb3d34e7b4739ce933356a7ffb0c41f0a
mod_session-2.4.6-95.el7.x86_64.rpm SHA-256: c77cc48333f3e92a22f5db565ec5db617712bcfed1a9a7e192972e96426944b3
mod_ssl-2.4.6-95.el7.x86_64.rpm SHA-256: 747871664b625e67bcf3f79e6bd3faf2ee791e37c02b59b34668392d154785b1

Red Hat Enterprise Linux Server - Extended Life Cycle Support 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
x86_64
httpd-2.4.6-95.el7.x86_64.rpm SHA-256: e7740953ec62a37a4222ae8fca055502d0477f640930ec0c03d6464f9ae0f500
httpd-debuginfo-2.4.6-95.el7.x86_64.rpm SHA-256: 46a46ee1951ca6d9145214a283f10ae66fdecb33ec4cf7f321c7129ac4b70511
httpd-debuginfo-2.4.6-95.el7.x86_64.rpm SHA-256: 46a46ee1951ca6d9145214a283f10ae66fdecb33ec4cf7f321c7129ac4b70511
httpd-devel-2.4.6-95.el7.x86_64.rpm SHA-256: 12775caf7c8ba029a7a4e90c3dcacfe93b9dccfd45d688a889fee17899db9243
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.x86_64.rpm SHA-256: ea607dcd9268fdab394848bc0a25743f22c31676e5ebfc30a1c42c47c5aa7e89
mod_ldap-2.4.6-95.el7.x86_64.rpm SHA-256: bb946b2b2f81d322c77cfbedd28573147412921456fe207bf649f7466b36672e
mod_proxy_html-2.4.6-95.el7.x86_64.rpm SHA-256: 83b9dd071afe046d519742199d6c559bb3d34e7b4739ce933356a7ffb0c41f0a
mod_session-2.4.6-95.el7.x86_64.rpm SHA-256: c77cc48333f3e92a22f5db565ec5db617712bcfed1a9a7e192972e96426944b3
mod_ssl-2.4.6-95.el7.x86_64.rpm SHA-256: 747871664b625e67bcf3f79e6bd3faf2ee791e37c02b59b34668392d154785b1

Red Hat Enterprise Linux Workstation 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
x86_64
httpd-2.4.6-95.el7.x86_64.rpm SHA-256: e7740953ec62a37a4222ae8fca055502d0477f640930ec0c03d6464f9ae0f500
httpd-debuginfo-2.4.6-95.el7.x86_64.rpm SHA-256: 46a46ee1951ca6d9145214a283f10ae66fdecb33ec4cf7f321c7129ac4b70511
httpd-debuginfo-2.4.6-95.el7.x86_64.rpm SHA-256: 46a46ee1951ca6d9145214a283f10ae66fdecb33ec4cf7f321c7129ac4b70511
httpd-devel-2.4.6-95.el7.x86_64.rpm SHA-256: 12775caf7c8ba029a7a4e90c3dcacfe93b9dccfd45d688a889fee17899db9243
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.x86_64.rpm SHA-256: ea607dcd9268fdab394848bc0a25743f22c31676e5ebfc30a1c42c47c5aa7e89
mod_ldap-2.4.6-95.el7.x86_64.rpm SHA-256: bb946b2b2f81d322c77cfbedd28573147412921456fe207bf649f7466b36672e
mod_proxy_html-2.4.6-95.el7.x86_64.rpm SHA-256: 83b9dd071afe046d519742199d6c559bb3d34e7b4739ce933356a7ffb0c41f0a
mod_session-2.4.6-95.el7.x86_64.rpm SHA-256: c77cc48333f3e92a22f5db565ec5db617712bcfed1a9a7e192972e96426944b3
mod_ssl-2.4.6-95.el7.x86_64.rpm SHA-256: 747871664b625e67bcf3f79e6bd3faf2ee791e37c02b59b34668392d154785b1

Red Hat Enterprise Linux Desktop 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
x86_64
httpd-2.4.6-95.el7.x86_64.rpm SHA-256: e7740953ec62a37a4222ae8fca055502d0477f640930ec0c03d6464f9ae0f500
httpd-debuginfo-2.4.6-95.el7.x86_64.rpm SHA-256: 46a46ee1951ca6d9145214a283f10ae66fdecb33ec4cf7f321c7129ac4b70511
httpd-devel-2.4.6-95.el7.x86_64.rpm SHA-256: 12775caf7c8ba029a7a4e90c3dcacfe93b9dccfd45d688a889fee17899db9243
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.x86_64.rpm SHA-256: ea607dcd9268fdab394848bc0a25743f22c31676e5ebfc30a1c42c47c5aa7e89
mod_ldap-2.4.6-95.el7.x86_64.rpm SHA-256: bb946b2b2f81d322c77cfbedd28573147412921456fe207bf649f7466b36672e
mod_proxy_html-2.4.6-95.el7.x86_64.rpm SHA-256: 83b9dd071afe046d519742199d6c559bb3d34e7b4739ce933356a7ffb0c41f0a
mod_session-2.4.6-95.el7.x86_64.rpm SHA-256: c77cc48333f3e92a22f5db565ec5db617712bcfed1a9a7e192972e96426944b3
mod_ssl-2.4.6-95.el7.x86_64.rpm SHA-256: 747871664b625e67bcf3f79e6bd3faf2ee791e37c02b59b34668392d154785b1

Red Hat Enterprise Linux for IBM z Systems 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
s390x
httpd-2.4.6-95.el7.s390x.rpm SHA-256: 630c7290fe1e28a16de6b347989582c21a66436fb09ad4a63a346b9bd51d3d0a
httpd-debuginfo-2.4.6-95.el7.s390x.rpm SHA-256: f6f448388a2ebb94910d01b9cf9d16cb5a4093bc5c80441f74b9883a82280e7f
httpd-debuginfo-2.4.6-95.el7.s390x.rpm SHA-256: f6f448388a2ebb94910d01b9cf9d16cb5a4093bc5c80441f74b9883a82280e7f
httpd-devel-2.4.6-95.el7.s390x.rpm SHA-256: 11d143462051adbae5deb2421fb552249ab93f01b3413e8f5bc4c9201d5eb42b
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.s390x.rpm SHA-256: 6ca08a1f4854dc7a72cd12f0ef664825a9d775a1038a8b29a07c7c0827da9f2c
mod_ldap-2.4.6-95.el7.s390x.rpm SHA-256: d70a6f98963142e042490206996e1f1294ff9fc7fcbb6f0a82eb98dcda9222c8
mod_proxy_html-2.4.6-95.el7.s390x.rpm SHA-256: d873c74c61841ba226dedf6b07a3ccd0a05cc80d7c130fea3d255f9528d1fd1d
mod_session-2.4.6-95.el7.s390x.rpm SHA-256: 0afb174cdf64f74cde04c1999076850721299f1bb804c00a24968aac7ee67d1e
mod_ssl-2.4.6-95.el7.s390x.rpm SHA-256: aef3e2ea36c71ed4c70b51e5dc64beab521061f1d709bf4db4165d7a230fbcfc

Red Hat Enterprise Linux for Power, big endian 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
ppc64
httpd-2.4.6-95.el7.ppc64.rpm SHA-256: 3b4497e24f51adadbee0924c337142ed370b5ef4d25abed0db840ec645595bfa
httpd-debuginfo-2.4.6-95.el7.ppc64.rpm SHA-256: 5e22221fc3cfe105452adb0a25f045b516f22038f72e398db3a9e48e9149dcaf
httpd-debuginfo-2.4.6-95.el7.ppc64.rpm SHA-256: 5e22221fc3cfe105452adb0a25f045b516f22038f72e398db3a9e48e9149dcaf
httpd-devel-2.4.6-95.el7.ppc64.rpm SHA-256: d2e628ba0038db8353b40752f21ecc6557a8c2de685f7939d79956a82d8adb59
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.ppc64.rpm SHA-256: 546849d4d29a06e58125d0f0869d1c4827d3767871287675b21b459323e0d9d0
mod_ldap-2.4.6-95.el7.ppc64.rpm SHA-256: fc49516172dde7a30767ede05c5e22da592755ec054173859eba7786ab51ed1b
mod_proxy_html-2.4.6-95.el7.ppc64.rpm SHA-256: 0bc223f5ebf5d6735c4ce2f95f7582c2fea30bd3d3192387ef5078948a2e0d8b
mod_session-2.4.6-95.el7.ppc64.rpm SHA-256: 790ed4daa5b768f71f51288d90754efed07f77df35b68cc9436d6eb90334967a
mod_ssl-2.4.6-95.el7.ppc64.rpm SHA-256: 92c7a991757480887c5a6428e8085a98b78966013b71348af17682212809747f

Red Hat Enterprise Linux for Scientific Computing 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
x86_64
httpd-2.4.6-95.el7.x86_64.rpm SHA-256: e7740953ec62a37a4222ae8fca055502d0477f640930ec0c03d6464f9ae0f500
httpd-debuginfo-2.4.6-95.el7.x86_64.rpm SHA-256: 46a46ee1951ca6d9145214a283f10ae66fdecb33ec4cf7f321c7129ac4b70511
httpd-devel-2.4.6-95.el7.x86_64.rpm SHA-256: 12775caf7c8ba029a7a4e90c3dcacfe93b9dccfd45d688a889fee17899db9243
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.x86_64.rpm SHA-256: ea607dcd9268fdab394848bc0a25743f22c31676e5ebfc30a1c42c47c5aa7e89
mod_ldap-2.4.6-95.el7.x86_64.rpm SHA-256: bb946b2b2f81d322c77cfbedd28573147412921456fe207bf649f7466b36672e
mod_proxy_html-2.4.6-95.el7.x86_64.rpm SHA-256: 83b9dd071afe046d519742199d6c559bb3d34e7b4739ce933356a7ffb0c41f0a
mod_session-2.4.6-95.el7.x86_64.rpm SHA-256: c77cc48333f3e92a22f5db565ec5db617712bcfed1a9a7e192972e96426944b3
mod_ssl-2.4.6-95.el7.x86_64.rpm SHA-256: 747871664b625e67bcf3f79e6bd3faf2ee791e37c02b59b34668392d154785b1

Red Hat Enterprise Linux for Power, little endian 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
ppc64le
httpd-2.4.6-95.el7.ppc64le.rpm SHA-256: 5506c31d4b5e209ac7eae2e600a617a09de18024ae4daaad665425e594701fc2
httpd-debuginfo-2.4.6-95.el7.ppc64le.rpm SHA-256: 7cc80bccf444adea760b3c77694a424bc58ac2413786096d04481b0100b61a93
httpd-debuginfo-2.4.6-95.el7.ppc64le.rpm SHA-256: 7cc80bccf444adea760b3c77694a424bc58ac2413786096d04481b0100b61a93
httpd-devel-2.4.6-95.el7.ppc64le.rpm SHA-256: 67905ef06f040aee6bce0c84c794163d2c88831d92c27180dcc55548a05a4a3e
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.ppc64le.rpm SHA-256: 9c708cb5f32e0d6e22dda129876da4339817e7bd15eedd4a62800b6fa3616c79
mod_ldap-2.4.6-95.el7.ppc64le.rpm SHA-256: 8230ce0b83775210987d1fa6023b38c58f3576c5749d9b4a078452dd4e2ae713
mod_proxy_html-2.4.6-95.el7.ppc64le.rpm SHA-256: a44afdce7757fb21a23e2f4241a7c3ffc9189810609dbc43c439698f5b4363d0
mod_session-2.4.6-95.el7.ppc64le.rpm SHA-256: bc8d3ba20414a43a0aa19b5bc8bced1e534e5f01121cc4cce30dfa6246a82c51
mod_ssl-2.4.6-95.el7.ppc64le.rpm SHA-256: fefd21e905095c6349c8b84e3a9ee24e4f5fe59e7c3d335c0ca50d30de379439

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
s390x
httpd-2.4.6-95.el7.s390x.rpm SHA-256: 630c7290fe1e28a16de6b347989582c21a66436fb09ad4a63a346b9bd51d3d0a
httpd-debuginfo-2.4.6-95.el7.s390x.rpm SHA-256: f6f448388a2ebb94910d01b9cf9d16cb5a4093bc5c80441f74b9883a82280e7f
httpd-debuginfo-2.4.6-95.el7.s390x.rpm SHA-256: f6f448388a2ebb94910d01b9cf9d16cb5a4093bc5c80441f74b9883a82280e7f
httpd-devel-2.4.6-95.el7.s390x.rpm SHA-256: 11d143462051adbae5deb2421fb552249ab93f01b3413e8f5bc4c9201d5eb42b
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.s390x.rpm SHA-256: 6ca08a1f4854dc7a72cd12f0ef664825a9d775a1038a8b29a07c7c0827da9f2c
mod_ldap-2.4.6-95.el7.s390x.rpm SHA-256: d70a6f98963142e042490206996e1f1294ff9fc7fcbb6f0a82eb98dcda9222c8
mod_proxy_html-2.4.6-95.el7.s390x.rpm SHA-256: d873c74c61841ba226dedf6b07a3ccd0a05cc80d7c130fea3d255f9528d1fd1d
mod_session-2.4.6-95.el7.s390x.rpm SHA-256: 0afb174cdf64f74cde04c1999076850721299f1bb804c00a24968aac7ee67d1e
mod_ssl-2.4.6-95.el7.s390x.rpm SHA-256: aef3e2ea36c71ed4c70b51e5dc64beab521061f1d709bf4db4165d7a230fbcfc

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
ppc64
httpd-2.4.6-95.el7.ppc64.rpm SHA-256: 3b4497e24f51adadbee0924c337142ed370b5ef4d25abed0db840ec645595bfa
httpd-debuginfo-2.4.6-95.el7.ppc64.rpm SHA-256: 5e22221fc3cfe105452adb0a25f045b516f22038f72e398db3a9e48e9149dcaf
httpd-debuginfo-2.4.6-95.el7.ppc64.rpm SHA-256: 5e22221fc3cfe105452adb0a25f045b516f22038f72e398db3a9e48e9149dcaf
httpd-devel-2.4.6-95.el7.ppc64.rpm SHA-256: d2e628ba0038db8353b40752f21ecc6557a8c2de685f7939d79956a82d8adb59
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.ppc64.rpm SHA-256: 546849d4d29a06e58125d0f0869d1c4827d3767871287675b21b459323e0d9d0
mod_ldap-2.4.6-95.el7.ppc64.rpm SHA-256: fc49516172dde7a30767ede05c5e22da592755ec054173859eba7786ab51ed1b
mod_proxy_html-2.4.6-95.el7.ppc64.rpm SHA-256: 0bc223f5ebf5d6735c4ce2f95f7582c2fea30bd3d3192387ef5078948a2e0d8b
mod_session-2.4.6-95.el7.ppc64.rpm SHA-256: 790ed4daa5b768f71f51288d90754efed07f77df35b68cc9436d6eb90334967a
mod_ssl-2.4.6-95.el7.ppc64.rpm SHA-256: 92c7a991757480887c5a6428e8085a98b78966013b71348af17682212809747f

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7

SRPM
httpd-2.4.6-95.el7.src.rpm SHA-256: 4b6d0c2c084c0f5facc737e483a4c0cce371a95fb73ea0b7b839b9318eb17d65
ppc64le
httpd-2.4.6-95.el7.ppc64le.rpm SHA-256: 5506c31d4b5e209ac7eae2e600a617a09de18024ae4daaad665425e594701fc2
httpd-debuginfo-2.4.6-95.el7.ppc64le.rpm SHA-256: 7cc80bccf444adea760b3c77694a424bc58ac2413786096d04481b0100b61a93
httpd-debuginfo-2.4.6-95.el7.ppc64le.rpm SHA-256: 7cc80bccf444adea760b3c77694a424bc58ac2413786096d04481b0100b61a93
httpd-devel-2.4.6-95.el7.ppc64le.rpm SHA-256: 67905ef06f040aee6bce0c84c794163d2c88831d92c27180dcc55548a05a4a3e
httpd-manual-2.4.6-95.el7.noarch.rpm SHA-256: 86a07c5155b3344d3738d98632f090a1292f2a12ec30797d98796cf28e05dc84
httpd-tools-2.4.6-95.el7.ppc64le.rpm SHA-256: 9c708cb5f32e0d6e22dda129876da4339817e7bd15eedd4a62800b6fa3616c79
mod_ldap-2.4.6-95.el7.ppc64le.rpm SHA-256: 8230ce0b83775210987d1fa6023b38c58f3576c5749d9b4a078452dd4e2ae713
mod_proxy_html-2.4.6-95.el7.ppc64le.rpm SHA-256: a44afdce7757fb21a23e2f4241a7c3ffc9189810609dbc43c439698f5b4363d0
mod_session-2.4.6-95.el7.ppc64le.rpm SHA-256: bc8d3ba20414a43a0aa19b5bc8bced1e534e5f01121cc4cce30dfa6246a82c51
mod_ssl-2.4.6-95.el7.ppc64le.rpm SHA-256: fefd21e905095c6349c8b84e3a9ee24e4f5fe59e7c3d335c0ca50d30de379439

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility