Skip to navigation

Security Advisory Moderate: httpd security and bug fix update

Advisory: RHSA-2011:1392-1
Type: Security Advisory
Severity: Moderate
Issued on: 2011-10-20
Last updated on: 2011-10-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2011-3368

Details

Updated httpd packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The Apache HTTP Server is a popular web server.

It was discovered that the Apache HTTP Server did not properly validate the
request URI for proxied requests. In certain configurations, if a reverse
proxy used the ProxyPassMatch directive, or if it used the RewriteRule
directive with the proxy flag, a remote attacker could make the proxy
connect to an arbitrary server, possibly disclosing sensitive information
from internal web servers not directly accessible to the attacker.
(CVE-2011-3368)

Red Hat would like to thank Context Information Security for reporting this
issue.

This update also fixes the following bug:

* The fix for CVE-2011-3192 provided by the RHSA-2011:1245 update
introduced regressions in the way httpd handled certain Range HTTP header
values. This update corrects those regressions. (BZ#736593, BZ#736594)

All httpd users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
httpd-2.2.3-53.el5_7.3.src.rpm
File outdated by:  RHSA-2014:0369
    MD5: 4c0e2a38f6cf2389f179415159928183
SHA-256: 293a342cacbaeed13ea55f9c1d4eb6352fc3279a8ea3d2e503307f9ab6ff4722
 
IA-32:
httpd-devel-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 0590d1ee7fd1396050cd2fd3e0b9d576
SHA-256: 39c590086324cc0cfd0abb8814c9a372fa559b51b0fe22fca6c7ce119ac473c6
httpd-manual-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 88041b4d602cb3eaa82d657df3412620
SHA-256: c96d729aef97f2923151c5eaacf4bc11e35526c192a111f7e54a4622b5192042
 
x86_64:
httpd-devel-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 0590d1ee7fd1396050cd2fd3e0b9d576
SHA-256: 39c590086324cc0cfd0abb8814c9a372fa559b51b0fe22fca6c7ce119ac473c6
httpd-devel-2.2.3-53.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: bf2611c8def9188845356b4166171336
SHA-256: 1ea1325524c02c196d31303fba296c103d56b36ce3c18f982cbb328a64705178
httpd-manual-2.2.3-53.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 7fea63fd525ca1e81106742780944ec3
SHA-256: 82311b3bd59fb6afad0395e59642ecadbab9cacc89d2d497f586e043e56f4d34
 
Red Hat Desktop (v. 4)

SRPMS:
httpd-2.0.52-49.ent.src.rpm     MD5: 90943869d1b82e89774ac652f7090242
SHA-256: bc7722cc71bf17d701e72f1723b63779b9aab85b41cf2af3614bf784ab971ca7
 
IA-32:
httpd-2.0.52-49.ent.i386.rpm     MD5: 48cd3073404530535dba0d6e3552d9d2
SHA-256: e6f7e1a792783f3e73fef1a6a6a05650fc677b9b78249d958bff0d2b2ad71c0b
httpd-devel-2.0.52-49.ent.i386.rpm     MD5: c8d74b0d5ebb07de8b0b9be316713e7b
SHA-256: 6624750441a7c814864b8387bcb937e3e56a6e45226b35fab163ce5dc35c4007
httpd-manual-2.0.52-49.ent.i386.rpm     MD5: 29f8a8228666d388d4eaeab5c918da13
SHA-256: 24cbfbc1cb13927d7bc0d51a9abdeb2472c249ee45d7ed7f0d727250c5cc6a6f
httpd-suexec-2.0.52-49.ent.i386.rpm     MD5: 4bf438b5d08179ece1f767610f700418
SHA-256: 77f12e7bd881fdee9224d7881a018727a5f03a8e88f5e8b0bf2cd0a31925a1d8
mod_ssl-2.0.52-49.ent.i386.rpm     MD5: 58de12b9789ee0a218613d11e33ad898
SHA-256: 2df5f7abfcddd8b9f2cfff76449fd616f22d575afa159fcc1a3a922d4e175c84
 
x86_64:
httpd-2.0.52-49.ent.x86_64.rpm     MD5: dca79554d106b4480524a5da2f1f34d6
SHA-256: b1cf32a095bb1c6a62cc78153b7df10a36c354df95337be1b3515ab4ba159c94
httpd-devel-2.0.52-49.ent.x86_64.rpm     MD5: a78faf8bdb366d7d8b7b736298a6918a
SHA-256: 72394afd2c625067bb7d4e1fae7ad78cdb386fd325fe3394f47b99f5f1523e4c
httpd-manual-2.0.52-49.ent.x86_64.rpm     MD5: a7f0a7cbdeea11159f0e8ed9d9108fe8
SHA-256: bdb18aab7e5180ac5a5fb06a37edecde5b20f0bff0c052a686e0bcab9edd7318
httpd-suexec-2.0.52-49.ent.x86_64.rpm     MD5: 8acae468340fb15b15dee1bc120c72c6
SHA-256: 50da3cd78809ada9bd887c7186654c0bdcc673af37d7b6adfd838363672723dc
mod_ssl-2.0.52-49.ent.x86_64.rpm     MD5: 18a890dd85537b9bfbd23b60dca40414
SHA-256: e1dfce7195f07e528f1fed561d58f0a12da5f370f5a67e74a22098fbf1cd9cee
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
httpd-2.2.3-53.el5_7.3.src.rpm
File outdated by:  RHSA-2014:0369
    MD5: 4c0e2a38f6cf2389f179415159928183
SHA-256: 293a342cacbaeed13ea55f9c1d4eb6352fc3279a8ea3d2e503307f9ab6ff4722
 
IA-32:
httpd-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 14cb4a6b202243805a00a54d7e5a3272
SHA-256: 9d6ba9ead725c01a2dced6873aef68e7849090fff08d3a95bdac9bc38fd1c014
httpd-devel-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 0590d1ee7fd1396050cd2fd3e0b9d576
SHA-256: 39c590086324cc0cfd0abb8814c9a372fa559b51b0fe22fca6c7ce119ac473c6
httpd-manual-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 88041b4d602cb3eaa82d657df3412620
SHA-256: c96d729aef97f2923151c5eaacf4bc11e35526c192a111f7e54a4622b5192042
mod_ssl-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 05517d14b328a5aad953a791c4b42554
SHA-256: 07fd7d0168df7142e78f27562d151ac378ff2ac2f8f66ff22d03262d957d92b3
 
IA-64:
httpd-2.2.3-53.el5_7.3.ia64.rpm
File outdated by:  RHSA-2014:0369
    MD5: e2fc86a43115a4bbe23d51d163751022
SHA-256: 13b4907eed544dc4164f48d8f8ff01629118bf0ca373e01e3a6b00a8174b9d47
httpd-devel-2.2.3-53.el5_7.3.ia64.rpm
File outdated by:  RHSA-2014:0369
    MD5: aed6a6be5fc3f358da597c6d14a6e204
SHA-256: 51721e52d5ce7baa6d767845b2b7ffdd7f590a6d36765bbde73a7c8a95fd8a6e
httpd-manual-2.2.3-53.el5_7.3.ia64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 8fac31f542205c58f99b196df626c494
SHA-256: 280b1f78e687ef1f317a1550daacc245133291a7c44ce182408faac11a4ce080
mod_ssl-2.2.3-53.el5_7.3.ia64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 01c3175553c3e04b8381c88a2445aadf
SHA-256: d4a29bf09aeff1b2b5d795f0958cc9718ba3dad2872dda995fbc0556ccec1867
 
PPC:
httpd-2.2.3-53.el5_7.3.ppc.rpm
File outdated by:  RHSA-2014:0369
    MD5: c5ddca55f8a6c90624fe9addc0c1e29e
SHA-256: 653e5ead43da33bc86b2a6458ef173221318aab28dd8ef1a17b7f783e69baed5
httpd-devel-2.2.3-53.el5_7.3.ppc.rpm
File outdated by:  RHSA-2014:0369
    MD5: 79ac83ef5114b1d4ed8c81a82f869163
SHA-256: b3f52a3e2134b297e59e8b641d346301a7fa9667bf5d0a8d9bea9e6c4ecc5932
httpd-devel-2.2.3-53.el5_7.3.ppc64.rpm
File outdated by:  RHSA-2014:0369
    MD5: a084fd7d82a4e5263af728cba8c80cd6
SHA-256: 8218c5faf260500e97a25b95b93b9ce5c24d5303542ba07a287304a6e18ab19f
httpd-manual-2.2.3-53.el5_7.3.ppc.rpm
File outdated by:  RHSA-2014:0369
    MD5: 57e7690ef663389ae3cf8c874be4815f
SHA-256: edc3a73ed27490e652c415b0c13ddee219bedca66c6e1c006e556499add48867
mod_ssl-2.2.3-53.el5_7.3.ppc.rpm
File outdated by:  RHSA-2014:0369
    MD5: faff315b429c4082c6285a11b2b958ee
SHA-256: f8d122f8ac1a5f1741a2d7d2e040d895a7e2b41c7962a27e13e71b9193e43936
 
s390x:
httpd-2.2.3-53.el5_7.3.s390x.rpm
File outdated by:  RHSA-2014:0369
    MD5: 368e0d9644c665dd3f6a3418aaa6aa0f
SHA-256: 325868b63a67ef9bcff2c614dc7e3ad61b07ab35246e3e6c7bfbed676716e4bb
httpd-devel-2.2.3-53.el5_7.3.s390.rpm
File outdated by:  RHSA-2014:0369
    MD5: cb8b754eabfe39512f519f6400701c49
SHA-256: 5b0d8e5c74c4c8f6b9f754aad933400efdc14bc1d5c39c155109fbd71c41a622
httpd-devel-2.2.3-53.el5_7.3.s390x.rpm
File outdated by:  RHSA-2014:0369
    MD5: 1bf0b491256422286212adb2825db31b
SHA-256: 6d01472977cc5b6431e8756d82ac6722c0f21a93923b62bc36d6977b65a31138
httpd-manual-2.2.3-53.el5_7.3.s390x.rpm
File outdated by:  RHSA-2014:0369
    MD5: d58282c9e321cf8846be8d9656c843d8
SHA-256: d530456199a71c66239d4d13426015b987bb68cf908083ba2aaad5d5e472de88
mod_ssl-2.2.3-53.el5_7.3.s390x.rpm
File outdated by:  RHSA-2014:0369
    MD5: dcbd6d9fae59c045d661bd2a321f0537
SHA-256: d2eb4321b5a495fb98d93ca05761b219c246e5ad019e11afcef588d912784bfa
 
x86_64:
httpd-2.2.3-53.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 38eeb36a7cdb6f0a660b90609f7c0df6
SHA-256: f2c39bb0632ac64ed639be2e8b678569a0183db394b9f43befbb91543a80539c
httpd-devel-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 0590d1ee7fd1396050cd2fd3e0b9d576
SHA-256: 39c590086324cc0cfd0abb8814c9a372fa559b51b0fe22fca6c7ce119ac473c6
httpd-devel-2.2.3-53.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: bf2611c8def9188845356b4166171336
SHA-256: 1ea1325524c02c196d31303fba296c103d56b36ce3c18f982cbb328a64705178
httpd-manual-2.2.3-53.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 7fea63fd525ca1e81106742780944ec3
SHA-256: 82311b3bd59fb6afad0395e59642ecadbab9cacc89d2d497f586e043e56f4d34
mod_ssl-2.2.3-53.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 84e6d8921d63f6abcdbccf89e43928fe
SHA-256: c27bb24ce8053b74e2a38e4f8577c5081fc2e9af50561d132ec4849fc70d6a24
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
httpd-2.0.52-49.ent.src.rpm     MD5: 90943869d1b82e89774ac652f7090242
SHA-256: bc7722cc71bf17d701e72f1723b63779b9aab85b41cf2af3614bf784ab971ca7
 
IA-32:
httpd-2.0.52-49.ent.i386.rpm     MD5: 48cd3073404530535dba0d6e3552d9d2
SHA-256: e6f7e1a792783f3e73fef1a6a6a05650fc677b9b78249d958bff0d2b2ad71c0b
httpd-devel-2.0.52-49.ent.i386.rpm     MD5: c8d74b0d5ebb07de8b0b9be316713e7b
SHA-256: 6624750441a7c814864b8387bcb937e3e56a6e45226b35fab163ce5dc35c4007
httpd-manual-2.0.52-49.ent.i386.rpm     MD5: 29f8a8228666d388d4eaeab5c918da13
SHA-256: 24cbfbc1cb13927d7bc0d51a9abdeb2472c249ee45d7ed7f0d727250c5cc6a6f
httpd-suexec-2.0.52-49.ent.i386.rpm     MD5: 4bf438b5d08179ece1f767610f700418
SHA-256: 77f12e7bd881fdee9224d7881a018727a5f03a8e88f5e8b0bf2cd0a31925a1d8
mod_ssl-2.0.52-49.ent.i386.rpm     MD5: 58de12b9789ee0a218613d11e33ad898
SHA-256: 2df5f7abfcddd8b9f2cfff76449fd616f22d575afa159fcc1a3a922d4e175c84
 
IA-64:
httpd-2.0.52-49.ent.ia64.rpm     MD5: 8655b4bb6f9985e29c7277feddb95d60
SHA-256: f638b9ccce72256dbfcb0684c837c82cd6577d6f4187135dc98c0719da387a5b
httpd-devel-2.0.52-49.ent.ia64.rpm     MD5: 109e1d5fb03135dd3509ac3690e32c6c
SHA-256: b3fa8c6c6e532951c4d604a973380bbbd9e78aa022fffd0dca4041283973647d
httpd-manual-2.0.52-49.ent.ia64.rpm     MD5: ca8830b1477d28e6e290ba19cef28d09
SHA-256: bc7f2466ad78538ee7be27fbec36ceb05ec4d9980f3ab6ebfbcd7e26e4b658fd
httpd-suexec-2.0.52-49.ent.ia64.rpm     MD5: 273a5c5378d8f563dc50a9c46e97cd20
SHA-256: daf005aa9942504208ef43171fc40ca3844843caad65856a10a817eb86ad5db0
mod_ssl-2.0.52-49.ent.ia64.rpm     MD5: 057c90df53bf36f3edbef7963aa17e6c
SHA-256: 84dfcc99be50651ee9601957ad66ed800c283c86ba54fe642483150ccb1d32de
 
PPC:
httpd-2.0.52-49.ent.ppc.rpm     MD5: 5661013c6b2181ab29ebc8a50b5bcfd2
SHA-256: 97db501d7d68c6998e6a7e1820de12326cc325020089e0dba4f34e45547ab566
httpd-devel-2.0.52-49.ent.ppc.rpm     MD5: d718388356045c64c5daeb3f8fa2436d
SHA-256: 7e8a91afb374756865a554ee4b6a4039f5a2e22544806e11e540a61b63e3861c
httpd-manual-2.0.52-49.ent.ppc.rpm     MD5: 2b38fbb1aa1bff60e206d1ce6c1e31fe
SHA-256: 25d5877781283be05aa05ef1032a9731c314af84b2e6205a5192861e45c17df9
httpd-suexec-2.0.52-49.ent.ppc.rpm     MD5: ed92fdc1060eca65ef3f4e0042162a5d
SHA-256: 614c33c90720c05ce902e336f07d68336736a1d73833add034374a28d98884bb
mod_ssl-2.0.52-49.ent.ppc.rpm     MD5: 16fa1c2c73c09463d2b18f26b4ea57d0
SHA-256: 7300efb833ce24c7296ad331cd0b29d34a5c33acff2a03014bb8dcc54d4ce113
 
s390:
httpd-2.0.52-49.ent.s390.rpm     MD5: c710dfed23b8aeeea088eea4df25a637
SHA-256: 0b6faed96362395c9fd15e2e825783ade86b0398f56bd57a62038507ede24baa
httpd-devel-2.0.52-49.ent.s390.rpm     MD5: aa6268633a904b52f394ea59936bf50a
SHA-256: 01af599d1404ba35e140dd20a492656e17351feedd516a4aa2dd362efb632ddd
httpd-manual-2.0.52-49.ent.s390.rpm     MD5: 158fe3583f73ed04ad1f170083f341eb
SHA-256: 9a09ace8aa507128a583cb644bb9629fbeccf1a019f5229a20a4a89e48c80e2e
httpd-suexec-2.0.52-49.ent.s390.rpm     MD5: 1df40bf2a4e66a51e6c20bc6b29d3f35
SHA-256: 9c16d17694dfcd62c3f5bb5834627f6b6d92f5ab1ae2442cf66bbf25e9317333
mod_ssl-2.0.52-49.ent.s390.rpm     MD5: f7aca1559ca19bfe036fa51066ceb094
SHA-256: 21a6af6ae8c3ca2ed5c522f010d80d2025c40d2f3d16edd433d7de65184a047b
 
s390x:
httpd-2.0.52-49.ent.s390x.rpm     MD5: 51582041b44fbcca148505f9dbf58b03
SHA-256: 1ba6242d0e1b0702c908cc4f2d7af56a4e0dc97cb58fbfa0076fa8aebf308f52
httpd-devel-2.0.52-49.ent.s390x.rpm     MD5: 5eda83a4608470163062754ff82ce301
SHA-256: 6868869d9fda6b5129def3333fd4b9c302df5086e805c4554d2975aa04620b4e
httpd-manual-2.0.52-49.ent.s390x.rpm     MD5: 62aee0a64192686f0f10d42164cdb3a9
SHA-256: 16bef590b6452ebabcf460312383b0733efa839749f33e57e270dca2cd07cbf8
httpd-suexec-2.0.52-49.ent.s390x.rpm     MD5: 1aa96bcb8e4a2402f8d624b1e266647a
SHA-256: 1dce9e15b735f492ccaaaf11097e78b28314f1aa0e704f7f89c9df4e453bfa42
mod_ssl-2.0.52-49.ent.s390x.rpm     MD5: f8e9d28f1063c9a26f92965f300d6c71
SHA-256: bdeb886c5099892ccea345753dcd8400446777a0d8a77daa04dae18ed04c6062
 
x86_64:
httpd-2.0.52-49.ent.x86_64.rpm     MD5: dca79554d106b4480524a5da2f1f34d6
SHA-256: b1cf32a095bb1c6a62cc78153b7df10a36c354df95337be1b3515ab4ba159c94
httpd-devel-2.0.52-49.ent.x86_64.rpm     MD5: a78faf8bdb366d7d8b7b736298a6918a
SHA-256: 72394afd2c625067bb7d4e1fae7ad78cdb386fd325fe3394f47b99f5f1523e4c
httpd-manual-2.0.52-49.ent.x86_64.rpm     MD5: a7f0a7cbdeea11159f0e8ed9d9108fe8
SHA-256: bdb18aab7e5180ac5a5fb06a37edecde5b20f0bff0c052a686e0bcab9edd7318
httpd-suexec-2.0.52-49.ent.x86_64.rpm     MD5: 8acae468340fb15b15dee1bc120c72c6
SHA-256: 50da3cd78809ada9bd887c7186654c0bdcc673af37d7b6adfd838363672723dc
mod_ssl-2.0.52-49.ent.x86_64.rpm     MD5: 18a890dd85537b9bfbd23b60dca40414
SHA-256: e1dfce7195f07e528f1fed561d58f0a12da5f370f5a67e74a22098fbf1cd9cee
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
httpd-2.2.3-53.el5_7.3.src.rpm
File outdated by:  RHSA-2014:0369
    MD5: 4c0e2a38f6cf2389f179415159928183
SHA-256: 293a342cacbaeed13ea55f9c1d4eb6352fc3279a8ea3d2e503307f9ab6ff4722
 
IA-32:
httpd-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 14cb4a6b202243805a00a54d7e5a3272
SHA-256: 9d6ba9ead725c01a2dced6873aef68e7849090fff08d3a95bdac9bc38fd1c014
mod_ssl-2.2.3-53.el5_7.3.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 05517d14b328a5aad953a791c4b42554
SHA-256: 07fd7d0168df7142e78f27562d151ac378ff2ac2f8f66ff22d03262d957d92b3
 
x86_64:
httpd-2.2.3-53.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 38eeb36a7cdb6f0a660b90609f7c0df6
SHA-256: f2c39bb0632ac64ed639be2e8b678569a0183db394b9f43befbb91543a80539c
mod_ssl-2.2.3-53.el5_7.3.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 84e6d8921d63f6abcdbccf89e43928fe
SHA-256: c27bb24ce8053b74e2a38e4f8577c5081fc2e9af50561d132ec4849fc70d6a24
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
httpd-2.0.52-49.ent.src.rpm     MD5: 90943869d1b82e89774ac652f7090242
SHA-256: bc7722cc71bf17d701e72f1723b63779b9aab85b41cf2af3614bf784ab971ca7
 
IA-32:
httpd-2.0.52-49.ent.i386.rpm     MD5: 48cd3073404530535dba0d6e3552d9d2
SHA-256: e6f7e1a792783f3e73fef1a6a6a05650fc677b9b78249d958bff0d2b2ad71c0b
httpd-devel-2.0.52-49.ent.i386.rpm     MD5: c8d74b0d5ebb07de8b0b9be316713e7b
SHA-256: 6624750441a7c814864b8387bcb937e3e56a6e45226b35fab163ce5dc35c4007
httpd-manual-2.0.52-49.ent.i386.rpm     MD5: 29f8a8228666d388d4eaeab5c918da13
SHA-256: 24cbfbc1cb13927d7bc0d51a9abdeb2472c249ee45d7ed7f0d727250c5cc6a6f
httpd-suexec-2.0.52-49.ent.i386.rpm     MD5: 4bf438b5d08179ece1f767610f700418
SHA-256: 77f12e7bd881fdee9224d7881a018727a5f03a8e88f5e8b0bf2cd0a31925a1d8
mod_ssl-2.0.52-49.ent.i386.rpm     MD5: 58de12b9789ee0a218613d11e33ad898
SHA-256: 2df5f7abfcddd8b9f2cfff76449fd616f22d575afa159fcc1a3a922d4e175c84
 
IA-64:
httpd-2.0.52-49.ent.ia64.rpm     MD5: 8655b4bb6f9985e29c7277feddb95d60
SHA-256: f638b9ccce72256dbfcb0684c837c82cd6577d6f4187135dc98c0719da387a5b
httpd-devel-2.0.52-49.ent.ia64.rpm     MD5: 109e1d5fb03135dd3509ac3690e32c6c
SHA-256: b3fa8c6c6e532951c4d604a973380bbbd9e78aa022fffd0dca4041283973647d
httpd-manual-2.0.52-49.ent.ia64.rpm     MD5: ca8830b1477d28e6e290ba19cef28d09
SHA-256: bc7f2466ad78538ee7be27fbec36ceb05ec4d9980f3ab6ebfbcd7e26e4b658fd
httpd-suexec-2.0.52-49.ent.ia64.rpm     MD5: 273a5c5378d8f563dc50a9c46e97cd20
SHA-256: daf005aa9942504208ef43171fc40ca3844843caad65856a10a817eb86ad5db0
mod_ssl-2.0.52-49.ent.ia64.rpm     MD5: 057c90df53bf36f3edbef7963aa17e6c
SHA-256: 84dfcc99be50651ee9601957ad66ed800c283c86ba54fe642483150ccb1d32de
 
x86_64:
httpd-2.0.52-49.ent.x86_64.rpm     MD5: dca79554d106b4480524a5da2f1f34d6
SHA-256: b1cf32a095bb1c6a62cc78153b7df10a36c354df95337be1b3515ab4ba159c94
httpd-devel-2.0.52-49.ent.x86_64.rpm     MD5: a78faf8bdb366d7d8b7b736298a6918a
SHA-256: 72394afd2c625067bb7d4e1fae7ad78cdb386fd325fe3394f47b99f5f1523e4c
httpd-manual-2.0.52-49.ent.x86_64.rpm     MD5: a7f0a7cbdeea11159f0e8ed9d9108fe8
SHA-256: bdb18aab7e5180ac5a5fb06a37edecde5b20f0bff0c052a686e0bcab9edd7318
httpd-suexec-2.0.52-49.ent.x86_64.rpm     MD5: 8acae468340fb15b15dee1bc120c72c6
SHA-256: 50da3cd78809ada9bd887c7186654c0bdcc673af37d7b6adfd838363672723dc
mod_ssl-2.0.52-49.ent.x86_64.rpm     MD5: 18a890dd85537b9bfbd23b60dca40414
SHA-256: e1dfce7195f07e528f1fed561d58f0a12da5f370f5a67e74a22098fbf1cd9cee
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
httpd-2.0.52-49.ent.src.rpm     MD5: 90943869d1b82e89774ac652f7090242
SHA-256: bc7722cc71bf17d701e72f1723b63779b9aab85b41cf2af3614bf784ab971ca7
 
IA-32:
httpd-2.0.52-49.ent.i386.rpm     MD5: 48cd3073404530535dba0d6e3552d9d2
SHA-256: e6f7e1a792783f3e73fef1a6a6a05650fc677b9b78249d958bff0d2b2ad71c0b
httpd-devel-2.0.52-49.ent.i386.rpm     MD5: c8d74b0d5ebb07de8b0b9be316713e7b
SHA-256: 6624750441a7c814864b8387bcb937e3e56a6e45226b35fab163ce5dc35c4007
httpd-manual-2.0.52-49.ent.i386.rpm     MD5: 29f8a8228666d388d4eaeab5c918da13
SHA-256: 24cbfbc1cb13927d7bc0d51a9abdeb2472c249ee45d7ed7f0d727250c5cc6a6f
httpd-suexec-2.0.52-49.ent.i386.rpm     MD5: 4bf438b5d08179ece1f767610f700418
SHA-256: 77f12e7bd881fdee9224d7881a018727a5f03a8e88f5e8b0bf2cd0a31925a1d8
mod_ssl-2.0.52-49.ent.i386.rpm     MD5: 58de12b9789ee0a218613d11e33ad898
SHA-256: 2df5f7abfcddd8b9f2cfff76449fd616f22d575afa159fcc1a3a922d4e175c84
 
IA-64:
httpd-2.0.52-49.ent.ia64.rpm     MD5: 8655b4bb6f9985e29c7277feddb95d60
SHA-256: f638b9ccce72256dbfcb0684c837c82cd6577d6f4187135dc98c0719da387a5b
httpd-devel-2.0.52-49.ent.ia64.rpm     MD5: 109e1d5fb03135dd3509ac3690e32c6c
SHA-256: b3fa8c6c6e532951c4d604a973380bbbd9e78aa022fffd0dca4041283973647d
httpd-manual-2.0.52-49.ent.ia64.rpm     MD5: ca8830b1477d28e6e290ba19cef28d09
SHA-256: bc7f2466ad78538ee7be27fbec36ceb05ec4d9980f3ab6ebfbcd7e26e4b658fd
httpd-suexec-2.0.52-49.ent.ia64.rpm     MD5: 273a5c5378d8f563dc50a9c46e97cd20
SHA-256: daf005aa9942504208ef43171fc40ca3844843caad65856a10a817eb86ad5db0
mod_ssl-2.0.52-49.ent.ia64.rpm     MD5: 057c90df53bf36f3edbef7963aa17e6c
SHA-256: 84dfcc99be50651ee9601957ad66ed800c283c86ba54fe642483150ccb1d32de
 
x86_64:
httpd-2.0.52-49.ent.x86_64.rpm     MD5: dca79554d106b4480524a5da2f1f34d6
SHA-256: b1cf32a095bb1c6a62cc78153b7df10a36c354df95337be1b3515ab4ba159c94
httpd-devel-2.0.52-49.ent.x86_64.rpm     MD5: a78faf8bdb366d7d8b7b736298a6918a
SHA-256: 72394afd2c625067bb7d4e1fae7ad78cdb386fd325fe3394f47b99f5f1523e4c
httpd-manual-2.0.52-49.ent.x86_64.rpm     MD5: a7f0a7cbdeea11159f0e8ed9d9108fe8
SHA-256: bdb18aab7e5180ac5a5fb06a37edecde5b20f0bff0c052a686e0bcab9edd7318
httpd-suexec-2.0.52-49.ent.x86_64.rpm     MD5: 8acae468340fb15b15dee1bc120c72c6
SHA-256: 50da3cd78809ada9bd887c7186654c0bdcc673af37d7b6adfd838363672723dc
mod_ssl-2.0.52-49.ent.x86_64.rpm     MD5: 18a890dd85537b9bfbd23b60dca40414
SHA-256: e1dfce7195f07e528f1fed561d58f0a12da5f370f5a67e74a22098fbf1cd9cee
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

736593 - httpd: RHSA-2011:1245 regressions [rhel-5]
736594 - httpd: RHSA-2011:1245 regressions [rhel-4]
740045 - CVE-2011-3368 httpd: reverse web proxy vulnerability


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/