- Issued:
- 2012-11-13
- Updated:
- 2012-11-13
RHBA-2012:1460 - Bug Fix Advisory
Synopsis
httpd bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated httpd packages that fix one bug are now available for Red Hat Enterprise
Linux 5 Extended Update Support.
Description
The httpd packages provide the Apache HTTP Server, a powerful, efficient and
extensible web server.
This update fixes the following bug:
- Due to a bug in the "mod_mem_cache" module, an aborted HTTP connection could
result in a cached entity becoming corrupt. With this update, the
"mod_mem_cache" module has been fixed to correctly handle aborted connections,
avoiding cache corruption in this scenario. (BZ#873676)
All users of httpd are advised to upgrade to these updated packages, which fix
this bug.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
- Red Hat Enterprise Linux Server - AUS 5.6 x86_64
- Red Hat Enterprise Linux Server - AUS 5.6 ia64
- Red Hat Enterprise Linux Server - AUS 5.6 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6
SRPM | |
---|---|
httpd-2.2.3-45.el5_6.3.src.rpm | SHA-256: 1447a0ff87836b4087958ad310af7ae1cb9d00b5eed301d7852b7bb2fc2cc661 |
x86_64 | |
httpd-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: e80761a76f6b2ea3f28f19c22141c01c2c95d49bbdd225219b49a00eeec51316 |
httpd-devel-2.2.3-45.el5_6.3.i386.rpm | SHA-256: df5ea746e596172cf0024cab258eac8e7709d70aaa8753400de5e608c3411c0d |
httpd-devel-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: 6fb39ab80d5e2b4d6ed02178d2c44ab6a1147fcd388654e4e5eaffc16400982d |
httpd-manual-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: f62d1a4cd9dbdd4c5cc59a165685d1dd73dcc8c5e651a7841b7f404f5e2de93e |
mod_ssl-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: c1fe628430da600f9eaeb98542099f2efcefc3910e35b9c6c1ced92552e521d2 |
ia64 | |
httpd-2.2.3-45.el5_6.3.ia64.rpm | SHA-256: cec583f815985f52484bc202714e4b180930b7cde849c7ac6592296eca5ad48a |
httpd-devel-2.2.3-45.el5_6.3.ia64.rpm | SHA-256: 90489ba8b41983c39fe48083dedfc65f68ca7b278f495c49da1bb6a84d19eabe |
httpd-manual-2.2.3-45.el5_6.3.ia64.rpm | SHA-256: 574c0c41a14addebc19b97f0b02b763c8ae039f1abfea63d9f6155d6f79f128c |
mod_ssl-2.2.3-45.el5_6.3.ia64.rpm | SHA-256: e7348046451688f62dd860fff9ce627d1acfa2a151505d60e3054aea84f676e2 |
i386 | |
httpd-2.2.3-45.el5_6.3.i386.rpm | SHA-256: 82b43c9b49c5d50dae2dab8ac53079cbaa1d943620089bb328510f86dbdd3908 |
httpd-devel-2.2.3-45.el5_6.3.i386.rpm | SHA-256: df5ea746e596172cf0024cab258eac8e7709d70aaa8753400de5e608c3411c0d |
httpd-manual-2.2.3-45.el5_6.3.i386.rpm | SHA-256: 212fad77e7edc785aa2f935abbee424ea750ee373a4f9bac0f89bfacfd0e5125 |
mod_ssl-2.2.3-45.el5_6.3.i386.rpm | SHA-256: cd32f940a30b1a7c040c159bf063729b7ebd566ca2747a970c3a436744dd6bbd |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6
SRPM | |
---|---|
httpd-2.2.3-45.el5_6.3.src.rpm | SHA-256: 1447a0ff87836b4087958ad310af7ae1cb9d00b5eed301d7852b7bb2fc2cc661 |
x86_64 | |
httpd-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: e80761a76f6b2ea3f28f19c22141c01c2c95d49bbdd225219b49a00eeec51316 |
httpd-devel-2.2.3-45.el5_6.3.i386.rpm | SHA-256: df5ea746e596172cf0024cab258eac8e7709d70aaa8753400de5e608c3411c0d |
httpd-devel-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: 6fb39ab80d5e2b4d6ed02178d2c44ab6a1147fcd388654e4e5eaffc16400982d |
httpd-manual-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: f62d1a4cd9dbdd4c5cc59a165685d1dd73dcc8c5e651a7841b7f404f5e2de93e |
mod_ssl-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: c1fe628430da600f9eaeb98542099f2efcefc3910e35b9c6c1ced92552e521d2 |
i386 | |
httpd-2.2.3-45.el5_6.3.i386.rpm | SHA-256: 82b43c9b49c5d50dae2dab8ac53079cbaa1d943620089bb328510f86dbdd3908 |
httpd-devel-2.2.3-45.el5_6.3.i386.rpm | SHA-256: df5ea746e596172cf0024cab258eac8e7709d70aaa8753400de5e608c3411c0d |
httpd-manual-2.2.3-45.el5_6.3.i386.rpm | SHA-256: 212fad77e7edc785aa2f935abbee424ea750ee373a4f9bac0f89bfacfd0e5125 |
mod_ssl-2.2.3-45.el5_6.3.i386.rpm | SHA-256: cd32f940a30b1a7c040c159bf063729b7ebd566ca2747a970c3a436744dd6bbd |
Red Hat Enterprise Linux Server - AUS 5.6
SRPM | |
---|---|
httpd-2.2.3-45.el5_6.3.src.rpm | SHA-256: 1447a0ff87836b4087958ad310af7ae1cb9d00b5eed301d7852b7bb2fc2cc661 |
x86_64 | |
httpd-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: e80761a76f6b2ea3f28f19c22141c01c2c95d49bbdd225219b49a00eeec51316 |
httpd-debuginfo-2.2.3-45.el5_6.3.i386.rpm | SHA-256: dd60e85b493110b9f0a887708c60004b6c7846cf51bcae5338bbf09eadefbed0 |
httpd-debuginfo-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: 6e26793002bb6e9282a53a84f15eb0b0503ba343df94e7689f87bfee7dced1c0 |
httpd-devel-2.2.3-45.el5_6.3.i386.rpm | SHA-256: df5ea746e596172cf0024cab258eac8e7709d70aaa8753400de5e608c3411c0d |
httpd-devel-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: 6fb39ab80d5e2b4d6ed02178d2c44ab6a1147fcd388654e4e5eaffc16400982d |
httpd-manual-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: f62d1a4cd9dbdd4c5cc59a165685d1dd73dcc8c5e651a7841b7f404f5e2de93e |
mod_ssl-2.2.3-45.el5_6.3.x86_64.rpm | SHA-256: c1fe628430da600f9eaeb98542099f2efcefc3910e35b9c6c1ced92552e521d2 |
ia64 | |
httpd-2.2.3-45.el5_6.3.ia64.rpm | SHA-256: cec583f815985f52484bc202714e4b180930b7cde849c7ac6592296eca5ad48a |
httpd-debuginfo-2.2.3-45.el5_6.3.ia64.rpm | SHA-256: 2af7d25646256d17b4f67f732c43eca26a777460a546dd0a4129d19b6f1986ec |
httpd-devel-2.2.3-45.el5_6.3.ia64.rpm | SHA-256: 90489ba8b41983c39fe48083dedfc65f68ca7b278f495c49da1bb6a84d19eabe |
httpd-manual-2.2.3-45.el5_6.3.ia64.rpm | SHA-256: 574c0c41a14addebc19b97f0b02b763c8ae039f1abfea63d9f6155d6f79f128c |
mod_ssl-2.2.3-45.el5_6.3.ia64.rpm | SHA-256: e7348046451688f62dd860fff9ce627d1acfa2a151505d60e3054aea84f676e2 |
i386 | |
httpd-2.2.3-45.el5_6.3.i386.rpm | SHA-256: 82b43c9b49c5d50dae2dab8ac53079cbaa1d943620089bb328510f86dbdd3908 |
httpd-debuginfo-2.2.3-45.el5_6.3.i386.rpm | SHA-256: dd60e85b493110b9f0a887708c60004b6c7846cf51bcae5338bbf09eadefbed0 |
httpd-devel-2.2.3-45.el5_6.3.i386.rpm | SHA-256: df5ea746e596172cf0024cab258eac8e7709d70aaa8753400de5e608c3411c0d |
httpd-manual-2.2.3-45.el5_6.3.i386.rpm | SHA-256: 212fad77e7edc785aa2f935abbee424ea750ee373a4f9bac0f89bfacfd0e5125 |
mod_ssl-2.2.3-45.el5_6.3.i386.rpm | SHA-256: cd32f940a30b1a7c040c159bf063729b7ebd566ca2747a970c3a436744dd6bbd |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6
SRPM | |
---|---|
httpd-2.2.3-45.el5_6.3.src.rpm | SHA-256: 1447a0ff87836b4087958ad310af7ae1cb9d00b5eed301d7852b7bb2fc2cc661 |
s390x | |
httpd-2.2.3-45.el5_6.3.s390x.rpm | SHA-256: 8d9f41a9df906c706f14c7470b30fc04ea81c4d744913545cc0b82c51ff2190c |
httpd-devel-2.2.3-45.el5_6.3.s390.rpm | SHA-256: 94f0187a3068df9a0fb3f35cf94df32e0007bdca0df8514a7af91baad44b0aaf |
httpd-devel-2.2.3-45.el5_6.3.s390x.rpm | SHA-256: bf6243e8fe51c0e2642bed98ee69292b907a0f0dedab7a95719231a99903516d |
httpd-manual-2.2.3-45.el5_6.3.s390x.rpm | SHA-256: d2a68d1b3d31a45977029a50ad0f1ff6dc5c8c4d3cbe9cac5d2ad994fc548bfa |
mod_ssl-2.2.3-45.el5_6.3.s390x.rpm | SHA-256: 661b3c7be2864e3935dad3656f62e11aeac6e985ca8081418a927d96bdafe976 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6
SRPM | |
---|---|
httpd-2.2.3-45.el5_6.3.src.rpm | SHA-256: 1447a0ff87836b4087958ad310af7ae1cb9d00b5eed301d7852b7bb2fc2cc661 |
ppc | |
httpd-2.2.3-45.el5_6.3.ppc.rpm | SHA-256: f72a92c043b2b72ea52ccab956a896712b9f8c8caa5f3fc5c06dcdcfefa06273 |
httpd-devel-2.2.3-45.el5_6.3.ppc.rpm | SHA-256: 8ec09732f236ece73a87b1fcd071e7ba8a958104bb35119475cbd0abadf4d606 |
httpd-devel-2.2.3-45.el5_6.3.ppc64.rpm | SHA-256: fc5bef3213b9fdd1c5a0f15d89cdd9cb9239cc1976d69a3914b68f4483ae8e63 |
httpd-manual-2.2.3-45.el5_6.3.ppc.rpm | SHA-256: 38e89958b6fc2bd9f75dbce23f870655c152871637ad6f42b5b7ec363da51629 |
mod_ssl-2.2.3-45.el5_6.3.ppc.rpm | SHA-256: d13de880640eaee88b9de521ae29be62e3ab4cae0dff6fff410e180b7040e9a7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.