Skip to navigation

Security Advisory Important: httpd security update

Advisory: RHSA-2011:1294-1
Type: Security Advisory
Severity: Important
Issued on: 2011-09-14
Last updated on: 2011-09-14
Affected Products: Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)
Red Hat Enterprise Linux Server EUS (v. 6.0.z)
CVEs (cve.mitre.org): CVE-2011-3192

Details

Updated httpd packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.3 Long Life, 5.6 Extended Update Support, and
6.0 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The Apache HTTP Server is a popular web server.

A flaw was found in the way the Apache HTTP Server handled Range HTTP
headers. A remote attacker could use this flaw to cause httpd to use an
excessive amount of memory and CPU time via HTTP requests with a
specially-crafted Range header. (CVE-2011-3192)

All httpd users should upgrade to these updated packages, which contain a
backported patch to correct this issue. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
httpd-2.2.3-45.el5_6.2.src.rpm
File outdated by:  RHBA-2012:1460
    MD5: af18effedbe3fbc9368a0fec9c0bbf03
SHA-256: d4b78a0eaf9098cf335130abb4c6c7dce1d7571df21ff8ce8a37ad12d915b24f
 
IA-32:
httpd-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: 69c6cba55f6559d9fee844c3acb5d50c
SHA-256: 544b2aef737473317a738c1ad170dbd587fd17213f17f048d8374fb5eec38867
httpd-devel-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: 0f0c1c457c74811f31defe16586358d0
SHA-256: 09394d979a237a181ddd13f4767f6f7f8f5014b40e573e24652025484213c225
httpd-manual-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: 9e26bf6c009d96085270f95a2fc9cc85
SHA-256: 604bf5f2bd6883144c1fbe3c5ee8021a73627f8fae637f1c8940132ea1e4a896
mod_ssl-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: cf6f9c5d025c6f98ad0425d5cbfab6c7
SHA-256: b6759df9f2f5f7c9b07833e619f4460e13aaaefeb78f17f23b022ae22b428738
 
IA-64:
httpd-2.2.3-45.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1460
    MD5: dab7b93b9e153c900faccd931bdd949c
SHA-256: 249a31be0e9a68be65c4e47cc24907f3f520c6dfc5217bb26c20e34c54c2f06f
httpd-devel-2.2.3-45.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1460
    MD5: 769b4c08f1545780b8a0a20137b0c0d5
SHA-256: d7a6a22f6d616d099fc1e3203365ffc8eed91cd35ffbe257e78c4497db79bc1f
httpd-manual-2.2.3-45.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1460
    MD5: f259ca8d629d6a654c4107df41c16cb2
SHA-256: 71298af8c9148018ebbbbf19810e9051ebec056bc4cc4010898dd2bdca544164
mod_ssl-2.2.3-45.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1460
    MD5: 5528d1c1fc63c67700736cf1bbbda154
SHA-256: d823d4a8cdd3c16f7f02c8ffc540099b0d94f9ef32d34c941337941f37fc6997
 
PPC:
httpd-2.2.3-45.el5_6.2.ppc.rpm
File outdated by:  RHBA-2012:1460
    MD5: 184516cc224fc002e562c50ae5090feb
SHA-256: f57c2a8c18fc1d0a6ce27f672929e5795e4b80939af7fe3901a4dc1cea5ea433
httpd-devel-2.2.3-45.el5_6.2.ppc.rpm
File outdated by:  RHBA-2012:1460
    MD5: 3812abc51523af595606821524502edc
SHA-256: 92172f066cb68b162391a5118531ba35b1a0dfbfcf76f776e7b09a7ec6f51edd
httpd-devel-2.2.3-45.el5_6.2.ppc64.rpm
File outdated by:  RHBA-2012:1460
    MD5: d01447a65bcdf4cea82ca7d0774637db
SHA-256: b2c45e977e89dcbde7729cebd4bebceddf9a39b0c3ebbb2290e81933df95a555
httpd-manual-2.2.3-45.el5_6.2.ppc.rpm
File outdated by:  RHBA-2012:1460
    MD5: d3c0ff49fcd24a8758b68580ceb117ff
SHA-256: eff6a89119fa2fc78cce275347d4f4bb470bc91ec0599c454c23fb6e4ef4c1e8
mod_ssl-2.2.3-45.el5_6.2.ppc.rpm
File outdated by:  RHBA-2012:1460
    MD5: aa294800b4f3baa19aad4c9bd9ff8a75
SHA-256: 2c017623b1fcb33cb8213b43b1d51038f786747a04c7a42d0aa1f5cb59813e8f
 
s390x:
httpd-2.2.3-45.el5_6.2.s390x.rpm
File outdated by:  RHBA-2012:1460
    MD5: b57b9b0318a872e05f1928f88aa0701b
SHA-256: e779636ad1b359ad2cc29b5d900feeb372efed7c70a3ae446d0096835359761b
httpd-devel-2.2.3-45.el5_6.2.s390.rpm
File outdated by:  RHBA-2012:1460
    MD5: 75bdf14b12e674967111f15c01999022
SHA-256: 271ed5d44b70ca3387956887fa2cafe482caac30a4ea1e8ef73dac2447800a6f
httpd-devel-2.2.3-45.el5_6.2.s390x.rpm
File outdated by:  RHBA-2012:1460
    MD5: 23385d15fc51d58915d8109c409f2afd
SHA-256: 5d412553a42d881e063a306ab6fe34991c093b6ac0bc7bb82074017f93f09269
httpd-manual-2.2.3-45.el5_6.2.s390x.rpm
File outdated by:  RHBA-2012:1460
    MD5: 80639dd2f75e2dc3baa6d3038d48ae8c
SHA-256: 54763d5ed601c18554368946de65825ac7de7b7c5a4e0ade250f7bc6f57d7154
mod_ssl-2.2.3-45.el5_6.2.s390x.rpm
File outdated by:  RHBA-2012:1460
    MD5: 336eb13bdcd2d54a7a4292e922d1692b
SHA-256: 37df253fe95c5a7a05877e0d0f20026bb77460637264c1d4d288cb57c181223a
 
x86_64:
httpd-2.2.3-45.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1460
    MD5: ff1dba75dd8ff8d6ce4c094eb4136b73
SHA-256: a777315e103dd37bfaf92053159cca4147c9dbb8abfaa37400d65b8a80bd5416
httpd-devel-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: 0f0c1c457c74811f31defe16586358d0
SHA-256: 09394d979a237a181ddd13f4767f6f7f8f5014b40e573e24652025484213c225
httpd-devel-2.2.3-45.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1460
    MD5: 1e1e614f5340d242a7d2b46a5322d69b
SHA-256: c51ce58a90203ee714c3ea7193af2c6e143f9b93c7c3c41ba166b8ed29ec292c
httpd-manual-2.2.3-45.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1460
    MD5: 181b21c7362c69b3785ca0688e471f7c
SHA-256: 593b4a1b26ab6c6e3870049eb3a95031a4d3a1886dd6d137c182fea5e8cc54a0
mod_ssl-2.2.3-45.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1460
    MD5: d949af7cd7addc654f9111da49010d47
SHA-256: 35ebba0e03d53a747f88e0246c7de77693ede3a37347f265cc05fab14a39c089
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
httpd-2.2.3-22.el5_3.3.src.rpm     MD5: ad1e134375d7c96fc672d4bfb303a17e
SHA-256: bff8239b215c6adb093ef4c11d7a8f1cf1c74afec0184a2e0c96db71e69082fb
 
IA-32:
httpd-2.2.3-22.el5_3.3.i386.rpm     MD5: 85c20b84fb7acd8c2df64c40e0c42886
SHA-256: e864b48ccd4b6ddcc6b2a1ae4d4667a69cb11f91f3cbbaaca0d5d12a6008ee9c
httpd-devel-2.2.3-22.el5_3.3.i386.rpm     MD5: 4987dab359993d252d15a3526b4a2f39
SHA-256: 05ebe308a22ed061164e97763b613ef069457fa6e370d4aef64652d021d255b2
httpd-manual-2.2.3-22.el5_3.3.i386.rpm     MD5: 30b7c97b80d5b465a69b27d73a91d912
SHA-256: 9b997444b85759d38ec14fd8e2f61babb25cbe1e79353aeaa3f00c67ce3ef8fc
mod_ssl-2.2.3-22.el5_3.3.i386.rpm     MD5: 7d1cd288b7b6d23c5a4957beeea2ae5a
SHA-256: bab833ec313702daea7e1e7e75bffe5535a7aeb10aca8bc5b77a2b858162479f
 
IA-64:
httpd-2.2.3-22.el5_3.3.ia64.rpm     MD5: ef2b412dc0d0c76f5101c47e1795644a
SHA-256: afdd2a4df4b343788e977464fba394e288b31fd6f94962efce8349339b92850b
httpd-devel-2.2.3-22.el5_3.3.ia64.rpm     MD5: 5d8b2c71377f574615ada07a3115c447
SHA-256: 9e7b0da0886a5d7f1ae26926b28eb1e451642a46c2b26f18bc8edaadac27b6c6
httpd-manual-2.2.3-22.el5_3.3.ia64.rpm     MD5: 1d28add65c45a195edcc308337dab5df
SHA-256: f4ec3b923a0da7b8155a98b7e47cd971392564e30f3759a86a3fdee402d4fe01
mod_ssl-2.2.3-22.el5_3.3.ia64.rpm     MD5: 20048cc0b373551c7d275f4726ebf59b
SHA-256: e66a1e88fef44b54ec26eb8e45b8460898c9adc95aeac138daebe6cf91221bc5
 
x86_64:
httpd-2.2.3-22.el5_3.3.x86_64.rpm     MD5: 291cc0108859d95a464f00f695bd754c
SHA-256: d5bee18da437b8b15523a4aed827a76e8f12f0bc153441e69c9acad5584c861f
httpd-devel-2.2.3-22.el5_3.3.i386.rpm     MD5: 4987dab359993d252d15a3526b4a2f39
SHA-256: 05ebe308a22ed061164e97763b613ef069457fa6e370d4aef64652d021d255b2
httpd-devel-2.2.3-22.el5_3.3.x86_64.rpm     MD5: 0dd031a518c9f7feebcc866ef560cdc6
SHA-256: 520f2e6e5a7d07911dce9643c436776d8a736e5fd8230dd37e0820edf24e8208
httpd-manual-2.2.3-22.el5_3.3.x86_64.rpm     MD5: 8f483170da21c307440242da8f923a64
SHA-256: 1aa4356f3968ef38d2e35ce782ab9a273c537dcddeced05ee2af5c81ebec727c
mod_ssl-2.2.3-22.el5_3.3.x86_64.rpm     MD5: a7618191dd0b6f08f9fdffcafcf65b8e
SHA-256: a26a196ea3df3cdf1908feba6d8613067821878ef49e6d3411d083697ad27055
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
httpd-2.2.3-45.el5_6.2.src.rpm
File outdated by:  RHBA-2012:1460
    MD5: af18effedbe3fbc9368a0fec9c0bbf03
SHA-256: d4b78a0eaf9098cf335130abb4c6c7dce1d7571df21ff8ce8a37ad12d915b24f
 
IA-32:
httpd-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: 69c6cba55f6559d9fee844c3acb5d50c
SHA-256: 544b2aef737473317a738c1ad170dbd587fd17213f17f048d8374fb5eec38867
httpd-devel-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: 0f0c1c457c74811f31defe16586358d0
SHA-256: 09394d979a237a181ddd13f4767f6f7f8f5014b40e573e24652025484213c225
httpd-manual-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: 9e26bf6c009d96085270f95a2fc9cc85
SHA-256: 604bf5f2bd6883144c1fbe3c5ee8021a73627f8fae637f1c8940132ea1e4a896
mod_ssl-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: cf6f9c5d025c6f98ad0425d5cbfab6c7
SHA-256: b6759df9f2f5f7c9b07833e619f4460e13aaaefeb78f17f23b022ae22b428738
 
IA-64:
httpd-2.2.3-45.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1460
    MD5: dab7b93b9e153c900faccd931bdd949c
SHA-256: 249a31be0e9a68be65c4e47cc24907f3f520c6dfc5217bb26c20e34c54c2f06f
httpd-devel-2.2.3-45.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1460
    MD5: 769b4c08f1545780b8a0a20137b0c0d5
SHA-256: d7a6a22f6d616d099fc1e3203365ffc8eed91cd35ffbe257e78c4497db79bc1f
httpd-manual-2.2.3-45.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1460
    MD5: f259ca8d629d6a654c4107df41c16cb2
SHA-256: 71298af8c9148018ebbbbf19810e9051ebec056bc4cc4010898dd2bdca544164
mod_ssl-2.2.3-45.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1460
    MD5: 5528d1c1fc63c67700736cf1bbbda154
SHA-256: d823d4a8cdd3c16f7f02c8ffc540099b0d94f9ef32d34c941337941f37fc6997
 
x86_64:
httpd-2.2.3-45.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1460
    MD5: ff1dba75dd8ff8d6ce4c094eb4136b73
SHA-256: a777315e103dd37bfaf92053159cca4147c9dbb8abfaa37400d65b8a80bd5416
httpd-devel-2.2.3-45.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1460
    MD5: 0f0c1c457c74811f31defe16586358d0
SHA-256: 09394d979a237a181ddd13f4767f6f7f8f5014b40e573e24652025484213c225
httpd-devel-2.2.3-45.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1460
    MD5: 1e1e614f5340d242a7d2b46a5322d69b
SHA-256: c51ce58a90203ee714c3ea7193af2c6e143f9b93c7c3c41ba166b8ed29ec292c
httpd-manual-2.2.3-45.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1460
    MD5: 181b21c7362c69b3785ca0688e471f7c
SHA-256: 593b4a1b26ab6c6e3870049eb3a95031a4d3a1886dd6d137c182fea5e8cc54a0
mod_ssl-2.2.3-45.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1460
    MD5: d949af7cd7addc654f9111da49010d47
SHA-256: 35ebba0e03d53a747f88e0246c7de77693ede3a37347f265cc05fab14a39c089
 
Red Hat Enterprise Linux Server EUS (v. 6.0.z)

SRPMS:
httpd-2.2.15-5.el6_0.1.src.rpm     MD5: 2be9f48025c8b49724af984b11e87fba
SHA-256: 48eeead1e6ea3d267f61ad4c147a3312e5730ee8e827042a22552da45f27e3e4
 
IA-32:
httpd-2.2.15-5.el6_0.1.i686.rpm     MD5: 1c983ecf0e33bad5807b123ba85a2839
SHA-256: bc7800468029ba65eea42d9c3cf0b435d1a31b5941f82b61da002d6163edc2ac
httpd-debuginfo-2.2.15-5.el6_0.1.i686.rpm     MD5: 17b22cc0d8138226fc9eb376accf66df
SHA-256: 4bc019217307be402e827e181b2d0aa6d726f375d0d623a68463f4bd03ab03e3
httpd-devel-2.2.15-5.el6_0.1.i686.rpm     MD5: 840736652a1490cc53cae293f5c6976e
SHA-256: 6fbbfa46378f7282423b108328e1917d1f5e346844ab11f6fb55018b90ee26d6
httpd-manual-2.2.15-5.el6_0.1.noarch.rpm     MD5: 441d3270e8326c85a809f272ad7a0f77
SHA-256: e4f19ad200094169b1789969756330e1a6486c78a0a3ea9b0ef1024f2f7aee85
httpd-tools-2.2.15-5.el6_0.1.i686.rpm     MD5: 59adb6895a19431dfc04cda55139ab26
SHA-256: ece3f76b3d3036f4c573c417fc2cbb7d8b70c3d3507eac1d62e8e51ace5c398d
mod_ssl-2.2.15-5.el6_0.1.i686.rpm     MD5: aa65a850df58534fda4037a995c8098a
SHA-256: 2b10ccad562f54dd642b0338d6517070f47d21b4aae6dd59d52150a5ad0bf388
 
PPC:
httpd-2.2.15-5.el6_0.1.ppc64.rpm     MD5: b5e740929816ba40095e8bd9f23d2796
SHA-256: 71620dd7f4d24971f58f68ac6b355edafc65588d3fc9334cb8817a62dd1fcf99
httpd-debuginfo-2.2.15-5.el6_0.1.ppc.rpm     MD5: 09e2799f2b847b99489d0b8d6d45c2a7
SHA-256: 2e1d0336111d4d0de285ef10802f1933f68553da5b6b0a049d8a1938cb132595
httpd-debuginfo-2.2.15-5.el6_0.1.ppc64.rpm     MD5: 7e91f9feb4b77716d4d4c926ee7b29b0
SHA-256: 5725aa20fe4d4861412d0f485696eda72716e4fae46f3303d226d9714aca9f57
httpd-devel-2.2.15-5.el6_0.1.ppc.rpm     MD5: 649a069e5d71e014d4aaec63bdf7421d
SHA-256: 2c7c732e45942a5e63983c1f471478bebcf0f9f09b063c28e6ce884f6cff828e
httpd-devel-2.2.15-5.el6_0.1.ppc64.rpm     MD5: 361672f85ffc1704c0d4bbfca88e0a98
SHA-256: c59971be43329e42615d0fcfa46660c83aa7e0383de8b8fa1361ef474fc68d65
httpd-manual-2.2.15-5.el6_0.1.noarch.rpm     MD5: 441d3270e8326c85a809f272ad7a0f77
SHA-256: e4f19ad200094169b1789969756330e1a6486c78a0a3ea9b0ef1024f2f7aee85
httpd-tools-2.2.15-5.el6_0.1.ppc64.rpm     MD5: ec905b8ce493baa548665d4f64f4c445
SHA-256: f2270a6da1ae53d9e7aa306acaf19aabe9972dab8c95c6f96146177f7a7ee594
mod_ssl-2.2.15-5.el6_0.1.ppc64.rpm     MD5: c14bb9e32eba66701e2ae50492334d80
SHA-256: fdd07386b88e1ec756c37e5824775392a30d5e380d0b364d92ac06ae618c3c31
 
s390x:
httpd-2.2.15-5.el6_0.1.s390x.rpm     MD5: 8a1848ffbfbf6a76e11c7101be55b07a
SHA-256: 605d6b6c3e4272a38482114b5fdef731396233e63cdece650b3b2c0a25dcbe1b
httpd-debuginfo-2.2.15-5.el6_0.1.s390.rpm     MD5: b9d4d055f5770c08669136167b179a3c
SHA-256: 528aae28488b8d90ad887d1de5b3d67e062306edd8c9ba57fed7b95b7c9b9ec3
httpd-debuginfo-2.2.15-5.el6_0.1.s390x.rpm     MD5: 2d6a4bda15277a0ef3ca6123985a18f5
SHA-256: be6959e0dab08a5396003ff0b979923e595a4ae160f3dafbef8b480ea665aac4
httpd-devel-2.2.15-5.el6_0.1.s390.rpm     MD5: 3ea4709f573e4806ee020bcff440db86
SHA-256: d5e01da8695f4bb11578b8c912ce6388f0a771d4abae6bcc634601cf9cfbb676
httpd-devel-2.2.15-5.el6_0.1.s390x.rpm     MD5: bd2da9a17d1f7e185c7a7ca444958b86
SHA-256: 78919e561dee536a1495e8d63fb4faae97ecb64d306b891105be2314c14cbe66
httpd-manual-2.2.15-5.el6_0.1.noarch.rpm     MD5: 441d3270e8326c85a809f272ad7a0f77
SHA-256: e4f19ad200094169b1789969756330e1a6486c78a0a3ea9b0ef1024f2f7aee85
httpd-tools-2.2.15-5.el6_0.1.s390x.rpm     MD5: 6f7c4ec694cdf793aadbfa62d364f3a2
SHA-256: 09e6a4500c1e3eeabb8ee35bba02a4256c82f70c9f311f5859a8058f2bc28b94
mod_ssl-2.2.15-5.el6_0.1.s390x.rpm     MD5: 1fbc4de2941bc7fb20317a0723bcbc41
SHA-256: 1eeb0b95352d2c3ad272a392de7b0dae152a855f66eb223bf7a04992cc73a565
 
x86_64:
httpd-2.2.15-5.el6_0.1.x86_64.rpm     MD5: 4e744e2a6a1581a689356a839647dd95
SHA-256: 4254cf55b907df1bffb56e3497a89660d3b73e715930e5b58cf4e5e9a4bf25eb
httpd-debuginfo-2.2.15-5.el6_0.1.i686.rpm     MD5: 17b22cc0d8138226fc9eb376accf66df
SHA-256: 4bc019217307be402e827e181b2d0aa6d726f375d0d623a68463f4bd03ab03e3
httpd-debuginfo-2.2.15-5.el6_0.1.x86_64.rpm     MD5: 9a11afe92c9beda4c9ec92139fd19abf
SHA-256: 263b07e691595a3da226ef35a003b72bcefa90278e11b7504100ca44c695c636
httpd-devel-2.2.15-5.el6_0.1.i686.rpm     MD5: 840736652a1490cc53cae293f5c6976e
SHA-256: 6fbbfa46378f7282423b108328e1917d1f5e346844ab11f6fb55018b90ee26d6
httpd-devel-2.2.15-5.el6_0.1.x86_64.rpm     MD5: 59256efc04ff979638e204640ce5a68c
SHA-256: ca0b6a1f49ed5eb8c1b65e5a3e5cac95917ff6cba4234953cbe1a129ef4cc762
httpd-manual-2.2.15-5.el6_0.1.noarch.rpm     MD5: 441d3270e8326c85a809f272ad7a0f77
SHA-256: e4f19ad200094169b1789969756330e1a6486c78a0a3ea9b0ef1024f2f7aee85
httpd-tools-2.2.15-5.el6_0.1.x86_64.rpm     MD5: 02361cf0aff25c897b6c0d4b092e401e
SHA-256: 106ea8f654a8fe93e6592f620181c7c2adbbc8b22b4ab0a54d8d1049d9c924c1
mod_ssl-2.2.15-5.el6_0.1.x86_64.rpm     MD5: 68cae158f47cf4e1979ecd70649be594
SHA-256: 094ee147dea4e8086f285d16fa229d8c7915f2cd1d6f21422fef6bc6b4951f17
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

732928 - CVE-2011-3192 httpd: multiple ranges DoS


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/