14.6 C
London
Tuesday, September 26, 2017
Home Tags Ministry of Defence

Tag: Ministry of Defence

Updated httpd packages that fix one bug are now available for Red Hat EnterpriseLinux 6. The httpd packages provide the Apache HTTP Server, a powerful, efficient, andextensible web server.This update fixes the following bug:* Previously, the mod_ssl module sent TLS warning messages when a TLS handshakewas received with an unrecognized host name in the Server Name Indication (SNI)hint. As a consequence, some TLS clients failed to operate correctly whenreceiving the TLS warning message, preventing access to the web site. With thisupdate, mod_ssl has been fixed to no longer send TLS warning messages, asrecommended by RFC 6066. As a result, errors and failures of certain TLS clientsno longer occur in the described scenario. (BZ#1297372)Users of httpd are advised to upgrade to these updated packages, which fix thisbug. After installing the updated packages, the httpd daemon will be restartedautomatically. Red Hat Enterprise Linux Desktop (v. 6) SRPMS: httpd-2.2.15-47.el6_7.2.src.rpmFile outdated by:  RHBA-2016:0136     MD5: d3fa7c9243a05817ee9976cba47d8036SHA-256: 50c2899c6025a76c6c8c9cdff5dcc69a1078947be570890d8a45cccbd6c0e543   IA-32: httpd-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6b179ec0df87038511448475ea91654dSHA-256: e4111279edb34cadb6acac3a92be496b1bb34b5e55b53b73b852b7b6bb9a1037 httpd-debuginfo-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 3d788eb3da5dcf68618c1793f994d732SHA-256: 1f7bc1f95d5aaa402c8243f27052539caa03f7793c7d69d565f667bfa8db1e45 httpd-devel-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6e16c689cb34d76320dd2fa890f66dfbSHA-256: 184a18405e5dca4d38268d15da6c94096569e91b7ec3bafe0f5f0b8705fc3f8f httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 4723de2894f182b6e48baa4c80f7c34eSHA-256: 1e14b1b5780c4228bbf517762a78fe6a7d10f582a43a20c682ecaeaff5c174e9 mod_ssl-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: caf3d601199f41d153f73ec9fe58f533SHA-256: 1df538855c3e6fe084d94dc3715917dfa4642a7671657438a92902eea99a4c2d   x86_64: httpd-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 05b0d4449291f62e285bfbc954f39ae9SHA-256: d9a8135f13fe81546083384e7ab3e1f62b666ff013fc7caa1c7098b734f8b120 httpd-debuginfo-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 3d788eb3da5dcf68618c1793f994d732SHA-256: 1f7bc1f95d5aaa402c8243f27052539caa03f7793c7d69d565f667bfa8db1e45 httpd-debuginfo-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 9e546485a5ccd5fd6b6ee43aae69cc4fSHA-256: 3a74a5eab181cbcbeaa38445a77e65eec0bd40b06f6d54c6e3f5a5cd60c8484a httpd-devel-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6e16c689cb34d76320dd2fa890f66dfbSHA-256: 184a18405e5dca4d38268d15da6c94096569e91b7ec3bafe0f5f0b8705fc3f8f httpd-devel-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: cb284be83a353bceb55ed6279aa4a6bcSHA-256: 6d6e040001838da715354d08af12be8481f6970d8139267247c96fb296fba81f httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: ef5083301fadacfb7158574bbf8cd6feSHA-256: e5547e57f39ef2e174e565d305b881f095a8347996dbe0d9a857747f571f6919 mod_ssl-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 6dae13bc136fbe5bc1ea7d786cf696bdSHA-256: 34039d912885a0fd1985db72eaaeded2a6cd70cf67deb21363dbd0c3883282d3   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: httpd-2.2.15-47.el6_7.2.src.rpmFile outdated by:  RHBA-2016:0136     MD5: d3fa7c9243a05817ee9976cba47d8036SHA-256: 50c2899c6025a76c6c8c9cdff5dcc69a1078947be570890d8a45cccbd6c0e543   x86_64: httpd-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 05b0d4449291f62e285bfbc954f39ae9SHA-256: d9a8135f13fe81546083384e7ab3e1f62b666ff013fc7caa1c7098b734f8b120 httpd-debuginfo-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 3d788eb3da5dcf68618c1793f994d732SHA-256: 1f7bc1f95d5aaa402c8243f27052539caa03f7793c7d69d565f667bfa8db1e45 httpd-debuginfo-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 9e546485a5ccd5fd6b6ee43aae69cc4fSHA-256: 3a74a5eab181cbcbeaa38445a77e65eec0bd40b06f6d54c6e3f5a5cd60c8484a httpd-devel-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6e16c689cb34d76320dd2fa890f66dfbSHA-256: 184a18405e5dca4d38268d15da6c94096569e91b7ec3bafe0f5f0b8705fc3f8f httpd-devel-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: cb284be83a353bceb55ed6279aa4a6bcSHA-256: 6d6e040001838da715354d08af12be8481f6970d8139267247c96fb296fba81f httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: ef5083301fadacfb7158574bbf8cd6feSHA-256: e5547e57f39ef2e174e565d305b881f095a8347996dbe0d9a857747f571f6919 mod_ssl-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 6dae13bc136fbe5bc1ea7d786cf696bdSHA-256: 34039d912885a0fd1985db72eaaeded2a6cd70cf67deb21363dbd0c3883282d3   Red Hat Enterprise Linux Server (v. 6) SRPMS: httpd-2.2.15-47.el6_7.2.src.rpmFile outdated by:  RHBA-2016:0136     MD5: d3fa7c9243a05817ee9976cba47d8036SHA-256: 50c2899c6025a76c6c8c9cdff5dcc69a1078947be570890d8a45cccbd6c0e543   IA-32: httpd-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6b179ec0df87038511448475ea91654dSHA-256: e4111279edb34cadb6acac3a92be496b1bb34b5e55b53b73b852b7b6bb9a1037 httpd-debuginfo-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 3d788eb3da5dcf68618c1793f994d732SHA-256: 1f7bc1f95d5aaa402c8243f27052539caa03f7793c7d69d565f667bfa8db1e45 httpd-devel-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6e16c689cb34d76320dd2fa890f66dfbSHA-256: 184a18405e5dca4d38268d15da6c94096569e91b7ec3bafe0f5f0b8705fc3f8f httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 4723de2894f182b6e48baa4c80f7c34eSHA-256: 1e14b1b5780c4228bbf517762a78fe6a7d10f582a43a20c682ecaeaff5c174e9 mod_ssl-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: caf3d601199f41d153f73ec9fe58f533SHA-256: 1df538855c3e6fe084d94dc3715917dfa4642a7671657438a92902eea99a4c2d   PPC: httpd-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: 90289e7a505dc7a422da994a89999868SHA-256: 1de474ebdc0bbae39a445ae1110f042483af625a86a4e3541a2c3164b2a2e407 httpd-debuginfo-2.2.15-47.el6_7.2.ppc.rpmFile outdated by:  RHBA-2016:0136     MD5: 13be25dc5c9d8b1406d10ddae4f6381bSHA-256: 7e26b36ae6169fb672b1b4ae9343539a0c06d4003b4eae7b2ac812fa203c695f httpd-debuginfo-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: 42b0a48ba37c32b5149e45bca626b37cSHA-256: 86c27258590368742feec2e86169f797c29e8af1b94041efea59e2708e1ed4f6 httpd-devel-2.2.15-47.el6_7.2.ppc.rpmFile outdated by:  RHBA-2016:0136     MD5: 5bd677e5d35bc5c2e696b25aaa9f5cefSHA-256: 3d20d9cfc0cf45ff027d90492d369f999f7febbcbdd869d43faeec3894f0b90d httpd-devel-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: e93f67c667d4baba92e983c0794d6528SHA-256: 33267653c90d3f138280e4982c9d69b0c6897d22bcecc731f6b5e78357bd7628 httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: ddefd06ff8b3d75d4a582ec67fdfaf31SHA-256: 5f01314ec8748b3fa6fa3b497abfc288ff25d073e5c8097790bd0bf17b15d0ec mod_ssl-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: 00a3ede1ad6e96287b2e2b18910d934dSHA-256: e0131f3c372fca503cb0b00abfa59b8fd053c9e02fa85a511d22b43a45a4f1e0   s390x: httpd-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: 6085dafb7d6ccbeb38d1b561881ba402SHA-256: 9e3d7c2f9119ae6d2d9ff60b371f2a5cc8dac45831ad14bd58d252558bc086a3 httpd-debuginfo-2.2.15-47.el6_7.2.s390.rpmFile outdated by:  RHBA-2016:0136     MD5: fda303fc3afaa56f042966d8e6913840SHA-256: 888e1685866d89f01883341b8cceeb0006d6cea1ad97911f9e2f315322eb4b0a httpd-debuginfo-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: fbf18f42f006f7af916cfad2a3662e2bSHA-256: 67a4d45298a039b50252f402f8602347714d74dd5c74985b4e3be7f6b048bd47 httpd-devel-2.2.15-47.el6_7.2.s390.rpmFile outdated by:  RHBA-2016:0136     MD5: 301ca0b7047bc3b4bb82011bca50c80dSHA-256: 11ec7d43f08aab3c78b80d7d924ae32b9c0d19e7c615231ddfe79276ae32d7b2 httpd-devel-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: efd0310b918dec081f31b21b46c63fd7SHA-256: bb00a09df65575f98aa22dafe2cbe19ad580bd7753de3dc64c7c2e7ae96ef31c httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: 9e990d221f5d5ca8505c104195364436SHA-256: 6c59de8890792112e3a3674a5835cd6c3b932606905d7e053eac93044c21f57c mod_ssl-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: 1b0fbd63c1f2cda33d561b6fa12d806dSHA-256: 6031b7fb0bc0ca6845f8aa1b22dfc2f6733910df093db357e5cfbcf7ac704563   x86_64: httpd-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 05b0d4449291f62e285bfbc954f39ae9SHA-256: d9a8135f13fe81546083384e7ab3e1f62b666ff013fc7caa1c7098b734f8b120 httpd-debuginfo-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 3d788eb3da5dcf68618c1793f994d732SHA-256: 1f7bc1f95d5aaa402c8243f27052539caa03f7793c7d69d565f667bfa8db1e45 httpd-debuginfo-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 9e546485a5ccd5fd6b6ee43aae69cc4fSHA-256: 3a74a5eab181cbcbeaa38445a77e65eec0bd40b06f6d54c6e3f5a5cd60c8484a httpd-devel-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6e16c689cb34d76320dd2fa890f66dfbSHA-256: 184a18405e5dca4d38268d15da6c94096569e91b7ec3bafe0f5f0b8705fc3f8f httpd-devel-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: cb284be83a353bceb55ed6279aa4a6bcSHA-256: 6d6e040001838da715354d08af12be8481f6970d8139267247c96fb296fba81f httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: ef5083301fadacfb7158574bbf8cd6feSHA-256: e5547e57f39ef2e174e565d305b881f095a8347996dbe0d9a857747f571f6919 mod_ssl-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 6dae13bc136fbe5bc1ea7d786cf696bdSHA-256: 34039d912885a0fd1985db72eaaeded2a6cd70cf67deb21363dbd0c3883282d3   Red Hat Enterprise Linux Server EUS (v. 6.7.z) SRPMS: httpd-2.2.15-47.el6_7.2.src.rpmFile outdated by:  RHBA-2016:0136     MD5: d3fa7c9243a05817ee9976cba47d8036SHA-256: 50c2899c6025a76c6c8c9cdff5dcc69a1078947be570890d8a45cccbd6c0e543   IA-32: httpd-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6b179ec0df87038511448475ea91654dSHA-256: e4111279edb34cadb6acac3a92be496b1bb34b5e55b53b73b852b7b6bb9a1037 httpd-debuginfo-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 3d788eb3da5dcf68618c1793f994d732SHA-256: 1f7bc1f95d5aaa402c8243f27052539caa03f7793c7d69d565f667bfa8db1e45 httpd-devel-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6e16c689cb34d76320dd2fa890f66dfbSHA-256: 184a18405e5dca4d38268d15da6c94096569e91b7ec3bafe0f5f0b8705fc3f8f httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 4723de2894f182b6e48baa4c80f7c34eSHA-256: 1e14b1b5780c4228bbf517762a78fe6a7d10f582a43a20c682ecaeaff5c174e9 mod_ssl-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: caf3d601199f41d153f73ec9fe58f533SHA-256: 1df538855c3e6fe084d94dc3715917dfa4642a7671657438a92902eea99a4c2d   PPC: httpd-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: 90289e7a505dc7a422da994a89999868SHA-256: 1de474ebdc0bbae39a445ae1110f042483af625a86a4e3541a2c3164b2a2e407 httpd-debuginfo-2.2.15-47.el6_7.2.ppc.rpmFile outdated by:  RHBA-2016:0136     MD5: 13be25dc5c9d8b1406d10ddae4f6381bSHA-256: 7e26b36ae6169fb672b1b4ae9343539a0c06d4003b4eae7b2ac812fa203c695f httpd-debuginfo-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: 42b0a48ba37c32b5149e45bca626b37cSHA-256: 86c27258590368742feec2e86169f797c29e8af1b94041efea59e2708e1ed4f6 httpd-devel-2.2.15-47.el6_7.2.ppc.rpmFile outdated by:  RHBA-2016:0136     MD5: 5bd677e5d35bc5c2e696b25aaa9f5cefSHA-256: 3d20d9cfc0cf45ff027d90492d369f999f7febbcbdd869d43faeec3894f0b90d httpd-devel-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: e93f67c667d4baba92e983c0794d6528SHA-256: 33267653c90d3f138280e4982c9d69b0c6897d22bcecc731f6b5e78357bd7628 httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: ddefd06ff8b3d75d4a582ec67fdfaf31SHA-256: 5f01314ec8748b3fa6fa3b497abfc288ff25d073e5c8097790bd0bf17b15d0ec mod_ssl-2.2.15-47.el6_7.2.ppc64.rpmFile outdated by:  RHBA-2016:0136     MD5: 00a3ede1ad6e96287b2e2b18910d934dSHA-256: e0131f3c372fca503cb0b00abfa59b8fd053c9e02fa85a511d22b43a45a4f1e0   s390x: httpd-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: 6085dafb7d6ccbeb38d1b561881ba402SHA-256: 9e3d7c2f9119ae6d2d9ff60b371f2a5cc8dac45831ad14bd58d252558bc086a3 httpd-debuginfo-2.2.15-47.el6_7.2.s390.rpmFile outdated by:  RHBA-2016:0136     MD5: fda303fc3afaa56f042966d8e6913840SHA-256: 888e1685866d89f01883341b8cceeb0006d6cea1ad97911f9e2f315322eb4b0a httpd-debuginfo-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: fbf18f42f006f7af916cfad2a3662e2bSHA-256: 67a4d45298a039b50252f402f8602347714d74dd5c74985b4e3be7f6b048bd47 httpd-devel-2.2.15-47.el6_7.2.s390.rpmFile outdated by:  RHBA-2016:0136     MD5: 301ca0b7047bc3b4bb82011bca50c80dSHA-256: 11ec7d43f08aab3c78b80d7d924ae32b9c0d19e7c615231ddfe79276ae32d7b2 httpd-devel-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: efd0310b918dec081f31b21b46c63fd7SHA-256: bb00a09df65575f98aa22dafe2cbe19ad580bd7753de3dc64c7c2e7ae96ef31c httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: 9e990d221f5d5ca8505c104195364436SHA-256: 6c59de8890792112e3a3674a5835cd6c3b932606905d7e053eac93044c21f57c mod_ssl-2.2.15-47.el6_7.2.s390x.rpmFile outdated by:  RHBA-2016:0136     MD5: 1b0fbd63c1f2cda33d561b6fa12d806dSHA-256: 6031b7fb0bc0ca6845f8aa1b22dfc2f6733910df093db357e5cfbcf7ac704563   x86_64: httpd-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 05b0d4449291f62e285bfbc954f39ae9SHA-256: d9a8135f13fe81546083384e7ab3e1f62b666ff013fc7caa1c7098b734f8b120 httpd-debuginfo-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 3d788eb3da5dcf68618c1793f994d732SHA-256: 1f7bc1f95d5aaa402c8243f27052539caa03f7793c7d69d565f667bfa8db1e45 httpd-debuginfo-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 9e546485a5ccd5fd6b6ee43aae69cc4fSHA-256: 3a74a5eab181cbcbeaa38445a77e65eec0bd40b06f6d54c6e3f5a5cd60c8484a httpd-devel-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6e16c689cb34d76320dd2fa890f66dfbSHA-256: 184a18405e5dca4d38268d15da6c94096569e91b7ec3bafe0f5f0b8705fc3f8f httpd-devel-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: cb284be83a353bceb55ed6279aa4a6bcSHA-256: 6d6e040001838da715354d08af12be8481f6970d8139267247c96fb296fba81f httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: ef5083301fadacfb7158574bbf8cd6feSHA-256: e5547e57f39ef2e174e565d305b881f095a8347996dbe0d9a857747f571f6919 mod_ssl-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 6dae13bc136fbe5bc1ea7d786cf696bdSHA-256: 34039d912885a0fd1985db72eaaeded2a6cd70cf67deb21363dbd0c3883282d3   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: httpd-2.2.15-47.el6_7.2.src.rpmFile outdated by:  RHBA-2016:0136     MD5: d3fa7c9243a05817ee9976cba47d8036SHA-256: 50c2899c6025a76c6c8c9cdff5dcc69a1078947be570890d8a45cccbd6c0e543   IA-32: httpd-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6b179ec0df87038511448475ea91654dSHA-256: e4111279edb34cadb6acac3a92be496b1bb34b5e55b53b73b852b7b6bb9a1037 httpd-debuginfo-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 3d788eb3da5dcf68618c1793f994d732SHA-256: 1f7bc1f95d5aaa402c8243f27052539caa03f7793c7d69d565f667bfa8db1e45 httpd-devel-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6e16c689cb34d76320dd2fa890f66dfbSHA-256: 184a18405e5dca4d38268d15da6c94096569e91b7ec3bafe0f5f0b8705fc3f8f httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 4723de2894f182b6e48baa4c80f7c34eSHA-256: 1e14b1b5780c4228bbf517762a78fe6a7d10f582a43a20c682ecaeaff5c174e9 mod_ssl-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: caf3d601199f41d153f73ec9fe58f533SHA-256: 1df538855c3e6fe084d94dc3715917dfa4642a7671657438a92902eea99a4c2d   x86_64: httpd-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 05b0d4449291f62e285bfbc954f39ae9SHA-256: d9a8135f13fe81546083384e7ab3e1f62b666ff013fc7caa1c7098b734f8b120 httpd-debuginfo-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 3d788eb3da5dcf68618c1793f994d732SHA-256: 1f7bc1f95d5aaa402c8243f27052539caa03f7793c7d69d565f667bfa8db1e45 httpd-debuginfo-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 9e546485a5ccd5fd6b6ee43aae69cc4fSHA-256: 3a74a5eab181cbcbeaa38445a77e65eec0bd40b06f6d54c6e3f5a5cd60c8484a httpd-devel-2.2.15-47.el6_7.2.i686.rpmFile outdated by:  RHBA-2016:0136     MD5: 6e16c689cb34d76320dd2fa890f66dfbSHA-256: 184a18405e5dca4d38268d15da6c94096569e91b7ec3bafe0f5f0b8705fc3f8f httpd-devel-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: cb284be83a353bceb55ed6279aa4a6bcSHA-256: 6d6e040001838da715354d08af12be8481f6970d8139267247c96fb296fba81f httpd-manual-2.2.15-47.el6_7.2.noarch.rpmFile outdated by:  RHBA-2016:0136     MD5: 09ea051cdc90832063d302b94d65f3e4SHA-256: 2cd8e47cff75f4a95e467dc4ca5de5ed6faedb32a26a856409f89707d8fb8217 httpd-tools-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: ef5083301fadacfb7158574bbf8cd6feSHA-256: e5547e57f39ef2e174e565d305b881f095a8347996dbe0d9a857747f571f6919 mod_ssl-2.2.15-47.el6_7.2.x86_64.rpmFile outdated by:  RHBA-2016:0136     MD5: 6dae13bc136fbe5bc1ea7d786cf696bdSHA-256: 34039d912885a0fd1985db72eaaeded2a6cd70cf67deb21363dbd0c3883282d3   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Updated httpd packages that fix one bug are now available for Red Hat EnterpriseLinux 6. The httpd packages provide the Apache HTTP Server, a powerful, efficient, andextensible web server.This update fixes the following bug:* Previously, when writing an error message about an incorrect HTTP interimresponse code to a log file, the httpd daemon used a NULL pointer instead of apointer to the real request. As a consequence, httpd could terminateunexpectedly with a segmentation fault if the back-end server sent incorrectinterim response code. With this update, the correct HTTP request pointer ispassed to the httpd logging code, and httpd no longer crashes in this scenario.(BZ#1300707)Users of httpd are advised to upgrade to these updated packages, which fix thisbug. After installing the updated packages, the httpd daemon will be restartedautomatically. Red Hat Enterprise Linux Desktop (v. 6) SRPMS: httpd-2.2.15-47.el6_7.3.src.rpm     MD5: 94aa7e18210af565cc2e1f4356c1d5bdSHA-256: c7fcf21e4a1950068fb8eedb83e6af2fe292398af7f00e8c06cfca0b282ea793   IA-32: httpd-2.2.15-47.el6_7.3.i686.rpm     MD5: ed246e66453388ad2e7351d11d59d7a6SHA-256: 882ec708e042ef8d188918927e47e0be35db2ddc59dee9ad0f059b456c451c9c httpd-debuginfo-2.2.15-47.el6_7.3.i686.rpm     MD5: 8b05f6a02cedbb8040a0a2c88e97628aSHA-256: c917be8f60e0f5ff425dc64b06c4bd59319b0f2474fadd3b6cdc6545cbd895b9 httpd-devel-2.2.15-47.el6_7.3.i686.rpm     MD5: 9403b84d784b5049b180c13bbf62809bSHA-256: a6939f976f387d55d2911b84560b838c8286b26579e362e6314155febf40e562 httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.i686.rpm     MD5: 525d3ee5cbc8e1fb2a08ff7585577874SHA-256: b276dbd759c29edee6861f6c91865d465ce479f210b5a3adf20dec5294b6753c mod_ssl-2.2.15-47.el6_7.3.i686.rpm     MD5: a82bbf5590f83f75d61461fdc6c35ec1SHA-256: dedbebb76072dc9d3ed4337509d8024d61307c3d90180cec2c911af9de9ce4c6   x86_64: httpd-2.2.15-47.el6_7.3.x86_64.rpm     MD5: e519492fcf0c9bfd6b9543f42fc22223SHA-256: 60474d622eb23d335b0881781e8677cb506c2f14df739c55ea0f7cc6f0a641c4 httpd-debuginfo-2.2.15-47.el6_7.3.i686.rpm     MD5: 8b05f6a02cedbb8040a0a2c88e97628aSHA-256: c917be8f60e0f5ff425dc64b06c4bd59319b0f2474fadd3b6cdc6545cbd895b9 httpd-debuginfo-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 35564f46c705dd8d1140e9fd5dc51a42SHA-256: 906f283c79f7e0a6a1025c13443fcb34f9cb59253740d77ab622e359a1c05723 httpd-devel-2.2.15-47.el6_7.3.i686.rpm     MD5: 9403b84d784b5049b180c13bbf62809bSHA-256: a6939f976f387d55d2911b84560b838c8286b26579e362e6314155febf40e562 httpd-devel-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 8a04ed2903503dac83572961b343eaceSHA-256: 02d110b8538d6a261be500ced8a083167eec365769c785d92d596d456dc5b6ef httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.x86_64.rpm     MD5: f497c92824852079f7454093da35f10dSHA-256: ed277a434eaed86a4bf00b3b1dc4ab9530d2c72edcb7d08d602f09e3146b3833 mod_ssl-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 7d7bbaa9c211cf0a43c0ba35d7b04fa1SHA-256: e9f0f6167bc3b262a5fa4d67fa9d6c82f87d2c90b8a4191182c39a41bab331e6   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: httpd-2.2.15-47.el6_7.3.src.rpm     MD5: 94aa7e18210af565cc2e1f4356c1d5bdSHA-256: c7fcf21e4a1950068fb8eedb83e6af2fe292398af7f00e8c06cfca0b282ea793   x86_64: httpd-2.2.15-47.el6_7.3.x86_64.rpm     MD5: e519492fcf0c9bfd6b9543f42fc22223SHA-256: 60474d622eb23d335b0881781e8677cb506c2f14df739c55ea0f7cc6f0a641c4 httpd-debuginfo-2.2.15-47.el6_7.3.i686.rpm     MD5: 8b05f6a02cedbb8040a0a2c88e97628aSHA-256: c917be8f60e0f5ff425dc64b06c4bd59319b0f2474fadd3b6cdc6545cbd895b9 httpd-debuginfo-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 35564f46c705dd8d1140e9fd5dc51a42SHA-256: 906f283c79f7e0a6a1025c13443fcb34f9cb59253740d77ab622e359a1c05723 httpd-devel-2.2.15-47.el6_7.3.i686.rpm     MD5: 9403b84d784b5049b180c13bbf62809bSHA-256: a6939f976f387d55d2911b84560b838c8286b26579e362e6314155febf40e562 httpd-devel-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 8a04ed2903503dac83572961b343eaceSHA-256: 02d110b8538d6a261be500ced8a083167eec365769c785d92d596d456dc5b6ef httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.x86_64.rpm     MD5: f497c92824852079f7454093da35f10dSHA-256: ed277a434eaed86a4bf00b3b1dc4ab9530d2c72edcb7d08d602f09e3146b3833 mod_ssl-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 7d7bbaa9c211cf0a43c0ba35d7b04fa1SHA-256: e9f0f6167bc3b262a5fa4d67fa9d6c82f87d2c90b8a4191182c39a41bab331e6   Red Hat Enterprise Linux Server (v. 6) SRPMS: httpd-2.2.15-47.el6_7.3.src.rpm     MD5: 94aa7e18210af565cc2e1f4356c1d5bdSHA-256: c7fcf21e4a1950068fb8eedb83e6af2fe292398af7f00e8c06cfca0b282ea793   IA-32: httpd-2.2.15-47.el6_7.3.i686.rpm     MD5: ed246e66453388ad2e7351d11d59d7a6SHA-256: 882ec708e042ef8d188918927e47e0be35db2ddc59dee9ad0f059b456c451c9c httpd-debuginfo-2.2.15-47.el6_7.3.i686.rpm     MD5: 8b05f6a02cedbb8040a0a2c88e97628aSHA-256: c917be8f60e0f5ff425dc64b06c4bd59319b0f2474fadd3b6cdc6545cbd895b9 httpd-devel-2.2.15-47.el6_7.3.i686.rpm     MD5: 9403b84d784b5049b180c13bbf62809bSHA-256: a6939f976f387d55d2911b84560b838c8286b26579e362e6314155febf40e562 httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.i686.rpm     MD5: 525d3ee5cbc8e1fb2a08ff7585577874SHA-256: b276dbd759c29edee6861f6c91865d465ce479f210b5a3adf20dec5294b6753c mod_ssl-2.2.15-47.el6_7.3.i686.rpm     MD5: a82bbf5590f83f75d61461fdc6c35ec1SHA-256: dedbebb76072dc9d3ed4337509d8024d61307c3d90180cec2c911af9de9ce4c6   PPC: httpd-2.2.15-47.el6_7.3.ppc64.rpm     MD5: 02b0aad9ccfc203729bcdbc01239d0f1SHA-256: 9aa02365265fa432379bd529af6eee70f949ef0c1299bbc1fa1f155e13da5929 httpd-debuginfo-2.2.15-47.el6_7.3.ppc.rpm     MD5: 85e5e700b1adca03b6dc59932ebdf9e5SHA-256: 1d95fc130d350985d25c6753dbe232a75a4f66e14a26b4d70f7711806860b082 httpd-debuginfo-2.2.15-47.el6_7.3.ppc64.rpm     MD5: 4ebe00746ce40eb0e1984ae9867ea9a9SHA-256: 6924bf1bc4507db28aca00849e0bb1f7e49e38a66409693729ffe35dcdb2fcea httpd-devel-2.2.15-47.el6_7.3.ppc.rpm     MD5: 354f7d705ccc6d3ff580ecf8c45ef20bSHA-256: a50da18771ad3d4e53300d7edc5487aa8915deab7f03eb73cb8c0a7f4828d6de httpd-devel-2.2.15-47.el6_7.3.ppc64.rpm     MD5: a07879f5821cb56c34fd2c335987b886SHA-256: 0873596a380d032dca79ccc30db697ca41b2184dad485b02b398087e80d79911 httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.ppc64.rpm     MD5: 993e578c2561e87e85cd0baae885d936SHA-256: 4f9a0ad35d896a0148364e57f4b111677c96738d117d2b49c0e2cf43fffd272e mod_ssl-2.2.15-47.el6_7.3.ppc64.rpm     MD5: 4b5af0c1f6317134f3b958c3d1ef2daeSHA-256: 2853c388112a9d73277c435035105673adb4484268375ae69af9a8fd44e71db7   s390x: httpd-2.2.15-47.el6_7.3.s390x.rpm     MD5: cb79a8fa8a496410cb3962e5ed3b1224SHA-256: e9fadfec45ee5e1ae371305786a5fe5f71ebc76022271edf1e51400c3e74075d httpd-debuginfo-2.2.15-47.el6_7.3.s390.rpm     MD5: f1b19281b94abc6dba54270a9ed3a0f3SHA-256: faa3a7474b6ae906257b66f2c60f1c8d0f1cabb954d51e74cee69b0610c949f7 httpd-debuginfo-2.2.15-47.el6_7.3.s390x.rpm     MD5: a049872ab89d7192773f5bc6e754212dSHA-256: 11ea6cd845700abe4039da018790700a28d2bd951b5b2d1ef812bfea37d93193 httpd-devel-2.2.15-47.el6_7.3.s390.rpm     MD5: f365aed98e5ab85081508f57c9d504d0SHA-256: 98f7c673658e3677b58bbfff99b4520460c0c91deda8f776e6b4f4996aebe627 httpd-devel-2.2.15-47.el6_7.3.s390x.rpm     MD5: bbb4c2b744474f4734552e9da6d6a4c9SHA-256: 7249ca338d399644617f0dab41fadd97a8a7b1f8f0f58528216e8d896ed9d103 httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.s390x.rpm     MD5: d486927280fd94f430e1595bd3d0711cSHA-256: 9fd4ca20dade4a60849ce124564bcb5e3f452e3e4a091a0d9854a29b25752f16 mod_ssl-2.2.15-47.el6_7.3.s390x.rpm     MD5: 89e02f836fcbc156e65cf8e831890c7eSHA-256: b947001bee6da749e2ee138b19434941fd4a7d1a1f0437953c6f3d3c1c59faef   x86_64: httpd-2.2.15-47.el6_7.3.x86_64.rpm     MD5: e519492fcf0c9bfd6b9543f42fc22223SHA-256: 60474d622eb23d335b0881781e8677cb506c2f14df739c55ea0f7cc6f0a641c4 httpd-debuginfo-2.2.15-47.el6_7.3.i686.rpm     MD5: 8b05f6a02cedbb8040a0a2c88e97628aSHA-256: c917be8f60e0f5ff425dc64b06c4bd59319b0f2474fadd3b6cdc6545cbd895b9 httpd-debuginfo-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 35564f46c705dd8d1140e9fd5dc51a42SHA-256: 906f283c79f7e0a6a1025c13443fcb34f9cb59253740d77ab622e359a1c05723 httpd-devel-2.2.15-47.el6_7.3.i686.rpm     MD5: 9403b84d784b5049b180c13bbf62809bSHA-256: a6939f976f387d55d2911b84560b838c8286b26579e362e6314155febf40e562 httpd-devel-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 8a04ed2903503dac83572961b343eaceSHA-256: 02d110b8538d6a261be500ced8a083167eec365769c785d92d596d456dc5b6ef httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.x86_64.rpm     MD5: f497c92824852079f7454093da35f10dSHA-256: ed277a434eaed86a4bf00b3b1dc4ab9530d2c72edcb7d08d602f09e3146b3833 mod_ssl-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 7d7bbaa9c211cf0a43c0ba35d7b04fa1SHA-256: e9f0f6167bc3b262a5fa4d67fa9d6c82f87d2c90b8a4191182c39a41bab331e6   Red Hat Enterprise Linux Server EUS (v. 6.7.z) SRPMS: httpd-2.2.15-47.el6_7.3.src.rpm     MD5: 94aa7e18210af565cc2e1f4356c1d5bdSHA-256: c7fcf21e4a1950068fb8eedb83e6af2fe292398af7f00e8c06cfca0b282ea793   IA-32: httpd-2.2.15-47.el6_7.3.i686.rpm     MD5: ed246e66453388ad2e7351d11d59d7a6SHA-256: 882ec708e042ef8d188918927e47e0be35db2ddc59dee9ad0f059b456c451c9c httpd-debuginfo-2.2.15-47.el6_7.3.i686.rpm     MD5: 8b05f6a02cedbb8040a0a2c88e97628aSHA-256: c917be8f60e0f5ff425dc64b06c4bd59319b0f2474fadd3b6cdc6545cbd895b9 httpd-devel-2.2.15-47.el6_7.3.i686.rpm     MD5: 9403b84d784b5049b180c13bbf62809bSHA-256: a6939f976f387d55d2911b84560b838c8286b26579e362e6314155febf40e562 httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.i686.rpm     MD5: 525d3ee5cbc8e1fb2a08ff7585577874SHA-256: b276dbd759c29edee6861f6c91865d465ce479f210b5a3adf20dec5294b6753c mod_ssl-2.2.15-47.el6_7.3.i686.rpm     MD5: a82bbf5590f83f75d61461fdc6c35ec1SHA-256: dedbebb76072dc9d3ed4337509d8024d61307c3d90180cec2c911af9de9ce4c6   PPC: httpd-2.2.15-47.el6_7.3.ppc64.rpm     MD5: 02b0aad9ccfc203729bcdbc01239d0f1SHA-256: 9aa02365265fa432379bd529af6eee70f949ef0c1299bbc1fa1f155e13da5929 httpd-debuginfo-2.2.15-47.el6_7.3.ppc.rpm     MD5: 85e5e700b1adca03b6dc59932ebdf9e5SHA-256: 1d95fc130d350985d25c6753dbe232a75a4f66e14a26b4d70f7711806860b082 httpd-debuginfo-2.2.15-47.el6_7.3.ppc64.rpm     MD5: 4ebe00746ce40eb0e1984ae9867ea9a9SHA-256: 6924bf1bc4507db28aca00849e0bb1f7e49e38a66409693729ffe35dcdb2fcea httpd-devel-2.2.15-47.el6_7.3.ppc.rpm     MD5: 354f7d705ccc6d3ff580ecf8c45ef20bSHA-256: a50da18771ad3d4e53300d7edc5487aa8915deab7f03eb73cb8c0a7f4828d6de httpd-devel-2.2.15-47.el6_7.3.ppc64.rpm     MD5: a07879f5821cb56c34fd2c335987b886SHA-256: 0873596a380d032dca79ccc30db697ca41b2184dad485b02b398087e80d79911 httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.ppc64.rpm     MD5: 993e578c2561e87e85cd0baae885d936SHA-256: 4f9a0ad35d896a0148364e57f4b111677c96738d117d2b49c0e2cf43fffd272e mod_ssl-2.2.15-47.el6_7.3.ppc64.rpm     MD5: 4b5af0c1f6317134f3b958c3d1ef2daeSHA-256: 2853c388112a9d73277c435035105673adb4484268375ae69af9a8fd44e71db7   s390x: httpd-2.2.15-47.el6_7.3.s390x.rpm     MD5: cb79a8fa8a496410cb3962e5ed3b1224SHA-256: e9fadfec45ee5e1ae371305786a5fe5f71ebc76022271edf1e51400c3e74075d httpd-debuginfo-2.2.15-47.el6_7.3.s390.rpm     MD5: f1b19281b94abc6dba54270a9ed3a0f3SHA-256: faa3a7474b6ae906257b66f2c60f1c8d0f1cabb954d51e74cee69b0610c949f7 httpd-debuginfo-2.2.15-47.el6_7.3.s390x.rpm     MD5: a049872ab89d7192773f5bc6e754212dSHA-256: 11ea6cd845700abe4039da018790700a28d2bd951b5b2d1ef812bfea37d93193 httpd-devel-2.2.15-47.el6_7.3.s390.rpm     MD5: f365aed98e5ab85081508f57c9d504d0SHA-256: 98f7c673658e3677b58bbfff99b4520460c0c91deda8f776e6b4f4996aebe627 httpd-devel-2.2.15-47.el6_7.3.s390x.rpm     MD5: bbb4c2b744474f4734552e9da6d6a4c9SHA-256: 7249ca338d399644617f0dab41fadd97a8a7b1f8f0f58528216e8d896ed9d103 httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.s390x.rpm     MD5: d486927280fd94f430e1595bd3d0711cSHA-256: 9fd4ca20dade4a60849ce124564bcb5e3f452e3e4a091a0d9854a29b25752f16 mod_ssl-2.2.15-47.el6_7.3.s390x.rpm     MD5: 89e02f836fcbc156e65cf8e831890c7eSHA-256: b947001bee6da749e2ee138b19434941fd4a7d1a1f0437953c6f3d3c1c59faef   x86_64: httpd-2.2.15-47.el6_7.3.x86_64.rpm     MD5: e519492fcf0c9bfd6b9543f42fc22223SHA-256: 60474d622eb23d335b0881781e8677cb506c2f14df739c55ea0f7cc6f0a641c4 httpd-debuginfo-2.2.15-47.el6_7.3.i686.rpm     MD5: 8b05f6a02cedbb8040a0a2c88e97628aSHA-256: c917be8f60e0f5ff425dc64b06c4bd59319b0f2474fadd3b6cdc6545cbd895b9 httpd-debuginfo-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 35564f46c705dd8d1140e9fd5dc51a42SHA-256: 906f283c79f7e0a6a1025c13443fcb34f9cb59253740d77ab622e359a1c05723 httpd-devel-2.2.15-47.el6_7.3.i686.rpm     MD5: 9403b84d784b5049b180c13bbf62809bSHA-256: a6939f976f387d55d2911b84560b838c8286b26579e362e6314155febf40e562 httpd-devel-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 8a04ed2903503dac83572961b343eaceSHA-256: 02d110b8538d6a261be500ced8a083167eec365769c785d92d596d456dc5b6ef httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.x86_64.rpm     MD5: f497c92824852079f7454093da35f10dSHA-256: ed277a434eaed86a4bf00b3b1dc4ab9530d2c72edcb7d08d602f09e3146b3833 mod_ssl-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 7d7bbaa9c211cf0a43c0ba35d7b04fa1SHA-256: e9f0f6167bc3b262a5fa4d67fa9d6c82f87d2c90b8a4191182c39a41bab331e6   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: httpd-2.2.15-47.el6_7.3.src.rpm     MD5: 94aa7e18210af565cc2e1f4356c1d5bdSHA-256: c7fcf21e4a1950068fb8eedb83e6af2fe292398af7f00e8c06cfca0b282ea793   IA-32: httpd-2.2.15-47.el6_7.3.i686.rpm     MD5: ed246e66453388ad2e7351d11d59d7a6SHA-256: 882ec708e042ef8d188918927e47e0be35db2ddc59dee9ad0f059b456c451c9c httpd-debuginfo-2.2.15-47.el6_7.3.i686.rpm     MD5: 8b05f6a02cedbb8040a0a2c88e97628aSHA-256: c917be8f60e0f5ff425dc64b06c4bd59319b0f2474fadd3b6cdc6545cbd895b9 httpd-devel-2.2.15-47.el6_7.3.i686.rpm     MD5: 9403b84d784b5049b180c13bbf62809bSHA-256: a6939f976f387d55d2911b84560b838c8286b26579e362e6314155febf40e562 httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.i686.rpm     MD5: 525d3ee5cbc8e1fb2a08ff7585577874SHA-256: b276dbd759c29edee6861f6c91865d465ce479f210b5a3adf20dec5294b6753c mod_ssl-2.2.15-47.el6_7.3.i686.rpm     MD5: a82bbf5590f83f75d61461fdc6c35ec1SHA-256: dedbebb76072dc9d3ed4337509d8024d61307c3d90180cec2c911af9de9ce4c6   x86_64: httpd-2.2.15-47.el6_7.3.x86_64.rpm     MD5: e519492fcf0c9bfd6b9543f42fc22223SHA-256: 60474d622eb23d335b0881781e8677cb506c2f14df739c55ea0f7cc6f0a641c4 httpd-debuginfo-2.2.15-47.el6_7.3.i686.rpm     MD5: 8b05f6a02cedbb8040a0a2c88e97628aSHA-256: c917be8f60e0f5ff425dc64b06c4bd59319b0f2474fadd3b6cdc6545cbd895b9 httpd-debuginfo-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 35564f46c705dd8d1140e9fd5dc51a42SHA-256: 906f283c79f7e0a6a1025c13443fcb34f9cb59253740d77ab622e359a1c05723 httpd-devel-2.2.15-47.el6_7.3.i686.rpm     MD5: 9403b84d784b5049b180c13bbf62809bSHA-256: a6939f976f387d55d2911b84560b838c8286b26579e362e6314155febf40e562 httpd-devel-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 8a04ed2903503dac83572961b343eaceSHA-256: 02d110b8538d6a261be500ced8a083167eec365769c785d92d596d456dc5b6ef httpd-manual-2.2.15-47.el6_7.3.noarch.rpm     MD5: da9338e58cd54e348063e520189d39adSHA-256: 7f4639399e8310ce843e8867b5282bbd82ad7f04344f45341547e499dee9372f httpd-tools-2.2.15-47.el6_7.3.x86_64.rpm     MD5: f497c92824852079f7454093da35f10dSHA-256: ed277a434eaed86a4bf00b3b1dc4ab9530d2c72edcb7d08d602f09e3146b3833 mod_ssl-2.2.15-47.el6_7.3.x86_64.rpm     MD5: 7d7bbaa9c211cf0a43c0ba35d7b04fa1SHA-256: e9f0f6167bc3b262a5fa4d67fa9d6c82f87d2c90b8a4191182c39a41bab331e6   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Original release date: November 10, 2015 | Last revised: November 13, 2015Systems Affected Compromised web servers with malicious web shells installed Overview This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This alert outlines the threat and provides prevention, detection, and mitigation strategies.Consistent use of web shells by Advanced Persistent Threat (APT) and criminal groups has led to significant cyber incidents.This product was developed in collaboration with US-CERT partners in the United Kingdom, Australia, Canada, and New Zealand based on activity seen targeting organizations across these countries. The detection and mitigation measures outlined in this document represent the shared judgement of all participating agencies. Description Web Shell DescriptionA web shell is a script that can be uploaded to a web server to enable remote administration of the machine. Infected web servers can be either Internet-facing or internal to the network, where the web shell is used to pivot further to internal hosts.A web shell can be written in any language that the target web server supports. The most commonly observed web shells are written in languages that are widely supported, such as PHP and ASP. Perl, Ruby, Python, and Unix shell scripts are also used.Using network reconnaissance tools, an adversary can identify vulnerabilities that can be exploited and result in the installation of a web shell. For example, these vulnerabilities can exist in content management systems (CMS) or web server software.Once successfully uploaded, an adversary can use the web shell to leverage other exploitation techniques to escalate privileges and to issue commands remotely. These commands are directly linked to the privilege and functionality available to the web server and may include the ability to add, delete, and execute files as well as the ability to run shell commands, further executables, or scripts.How and why are they used by malicious adversaries?Web shells are frequently used in compromises due to the combination of remote access and functionality. Even simple web shells can have a considerable impact and often maintain minimal presence.Web shells are utilized for the following purposes:To harvest and exfiltrate sensitive data and credentials;To upload additional malware for the potential of creating, for example, a watering hole for infection and scanning of further victims;To use as a relay point to issue commands to hosts inside the network without direct Internet access;To use as command-and-control infrastructure, potentially in the form of a bot in a botnet or in support of compromises to additional external networks. This could occur if the adversary intends to maintain long-term persistence.While a web shell itself would not normally be used for denial of service (DoS) attacks, it can act as a platform for uploading further tools, including DoS capability.ExamplesWeb shells such as China Chopper, WSO, C99 and B374K are frequently chosen by adversaries; however these are just a small number of known used web shells. (Further information linking to IOCs and SNORT rules can be found in the Additional Resources section).China Chopper – A small web shell packed with features. Has several command and control features including a password brute force capability.WSO – Stands for “web shell by orb” and has the ability to masquerade as an error page containing a hidden login form.C99 – A version of the WSO shell with additional functionality. Can display the server’s security measures and contains a self-delete function.B374K – PHP based web shell with common functionality such as viewing processes and executing commands.Delivery TacticsWeb shells can be delivered through a number of web application exploits or configuration weaknesses including:Cross-Site Scripting;SQL Injection;Vulnerabilities in applications/services  (e.g., WordPress or other CMS applications);File processing vulnerabilities (e.g., upload filtering or assigned permissions);Remote File Include (RFI) and Local File Include (LFI) vulnerabilities;Exposed Admin Interfaces (possible areas to find vulnerabilities mentioned above).The above tactics can be and are combined regularly. For example, an exposed admin interface also requires a file upload option, or another exploit method mentioned above, to deliver successfully. Impact A successfully uploaded shell script may allow a remote attacker to bypass security restrictions and gain unauthorized system access. Solution Prevention and MitigationInstallation of a web shell is commonly accomplished through web application vulnerabilities or configuration weaknesses. Therefore, identification and closure of these vulnerabilities is crucial to avoiding potential compromise. The following suggestions specify good security and web shell specific practices:Employ regular updates to applications and the host operating system to ensure protection against known vulnerabilities.Implement a least-privileges policy on the web server to:Reduce adversaries’ ability to escalate privileges or pivot laterally to other hosts.Control creation and execution of files in particular directories.If not already present, consider deploying a demilitarized zone (DMZ) between your webfacing systems and the corporate network. Limiting the interaction and logging traffic between the two provides a method to identify possible malicious activity.Ensure a secure configuration of web servers. All unnecessary services and ports should be disabled or blocked. All necessary services and ports should be restricted where feasible. This can include whitelisting or blocking external access to administration panels and not using default login credentials.Utilize a reverse proxy or alternative service, such as mod_security, to restrict accessible URL paths to known legitimate ones.Establish, and backup offline, a “known good” version of the relevant server and a regular change-management  policy to enable monitoring for changes to servable content with a file integrity system.Employ user input validation to restrict local and remote file inclusion vulnerabilities.Conduct regular system and application vulnerability scans to establish areas of risk. While this method does not protect against zero day attacks it will highlight possible areas of concern.Deploy a web application firewall and conduct regular virus signature checks, application fuzzing, code reviews and server network analysis.DetectionDue to the potential simplicity and ease of modification of web shells, they can be difficult to detect. For example, anti-virus products sometimes produce poor results in detecting web shells.The following may be indicators that your system has been infected by a web shell. Note a number of these indicators are common to legitimate files. Any suspected malicious files should be considered in the context of other indicators and triaged to determine whether further inspection or validation is required.Abnormal periods of high site usage (due to potential uploading and downloading activity);Files with an unusual timestamp (e.g., more recent than the last update of the web applications installed);Suspicious files in Internet-accessible locations (web root);Files containing references to suspicious keywords such as cmd.exe or eval;Unexpected connections in logs. For example:A file type generating unexpected or anomalous network traffic (e.g., a JPG file making requests with POST parameters);Suspicious logins originating from internal subnets to DMZ servers and vice versa.Any evidence of suspicious shell commands, such as directory traversal, by the web server process. For investigating many types of shells, a search engine can be very helpful. Often, web shells will be used to spread malware onto a server and the search engines are able to see it. But many web shells check the User-Agent and will display differently for a search engine spider (a program that crawls through links on the Internet, grabbing content from sites and adding it to search engine indexes) than for a regular user. To find a shell, you may need to change your User-Agent to one of the search engine bots. Some browsers have plugins that allow you to easily switch a User-Agent. Once the shell is detected, simply delete the file from the server.Client characteristics can also indicate possible web shell activity. For example, the malicious actor will often visit only the URI where the web shell script was created, but a standard user usually loads the webpage from a linked page/referrer or loads additional content/resources. Thus, performing frequency analysis on the web access logs could indicate the location of a web shell. Most legitimate URI visits will contain varying user-agents, whereas a web shell is generally only visited by the creator, resulting in limited user-agent variants. References Australian Cyber Security Centre – Securing Content Management Systems (CMS) FireEye China Chopper – The Little Malware That Could. Detecting and Defeating the China Chopper Web Shell MANDIANT – Old Web Shells New Tricks FireEye – Breaking Down the China Chopper Web Shell Part I FireEye – Breaking Down the China Chopper Web Shell Part II WSO Information Exploit-db – China Chopper C99 INFOSEC Institute – Web Shell Detection Revision History November 10, 2015: Initial Release November 13, 2015: Changes to Title and Systems Affected sections This product is provided subject to this Notification and this Privacy & Use policy.
Gameplay footage of new game has also been removed from YouTube.
14000 tonnes of carbon reduced over 10 years and multiple MOD data centres consolidated to a single siteSpring Park, Wiltshire - 2 December 2014 - Ark Data Centres, which designs, constructs and operates the UK's most efficient data centres, today anno...
The Ministry of Defence (MoD) is aiming to reduce its IT carbon footprint with the construction of a new datacentre to replace its existing host site in Bath. According to Ark Data Centres, which is implementing the new datacentre, the MoD will be able to cut 14,000 tonnes of carbon over 10 years. The new site, based at Corsham in Wiltshire, will also be used to consolidate multiple MoD datacentres into a single facility. The MoD is closing the existing host site in Bath as part of the department’s ongoing programme of cost-savings and efficiency. Ark Data Centres said the total cost of ownership (TCO) of the datacentre in Corsham will be significantly lower when compared to the old site. "We surveyed the existing MoD datacentre and designed an Ark environment that is far smaller, more flexible and accommodates all of the department’s needs, future-proofed with room to grow," said Steve Webb, COO at Ark Data Centres. "This includes a link to the MoD’s Information Systems and Services (ISS) headquarters building at Corsham - which happens to be next door to our site - so that ISS can conveniently work with the new datacentre. This is a great example of how the MoD can benefit from secure sharing in a very high efficiency environment. The location of Ark’s Spring Park so close to the MoD’s existing location at Corsham was really important.” As Computer Weekly reported in 2013, datacentres are a key focus of the government’s green IT strategy and the Green ICT Delivery Unit (GDU), according to the Greening Government: ICT Annual Report 2013. Earlier this year Mike Stone stepped in as interim CIO at the MoD. Stone was previously chief executive officer of Defence Business Services, an outsourced contract from Serco providing corporate services to the MoD. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK
An updated mod_auth_mellon package that fixes two security issues is nowavailable for Red Hat Enterprise Linux 6.Red Hat Product Security has rated this update as having Important securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section. mod_auth_mellon provides a SAML 2.0 authentication module for the ApacheHTTP Server.An information disclosure flaw was found in mod_auth_mellon's sessionhandling that could lead to sessions overlapping in memory. A remoteattacker could potentially use this flaw to obtain data from another user'ssession. (CVE-2014-8566)It was found that uninitialized data could be read when processing a user'slogout request. By attempting to log out, a user could possibly cause theApache HTTP Server to crash. (CVE-2014-8567)Red Hat would like to thank the mod_auth_mellon team for reporting theseissues. Upstream acknowledges Matthew Slowe as the original reporter ofCVE-2014-8566.All users of mod_auth_mellon are advised to upgrade to this updatedpackage, which contains a backported patch to correct these issues. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Server (v. 6) SRPMS: mod_auth_mellon-0.8.0-3.el6_6.src.rpm     MD5: ca089b4f4677a31329612be2dc851fc0SHA-256: 7b22f6755293b117548f107b52044070fa573d6455b23d1336e85c83f150ba23   IA-32: mod_auth_mellon-0.8.0-3.el6_6.i686.rpm     MD5: afd1129cbbce483b2b4dff61e72300c6SHA-256: 725617a0f812cde89238967aa48af710a52976d646165fd83385116bd74b85be mod_auth_mellon-debuginfo-0.8.0-3.el6_6.i686.rpm     MD5: 5fc2d1e8cb8165ae13c6d382ec972d92SHA-256: b3e8ffe96420ae4913bb2366d49b52b2e49a74c0de02ad299097d9c9cc7a9429   PPC: mod_auth_mellon-0.8.0-3.el6_6.ppc64.rpm     MD5: fa3b5f0e4f173cde8b01f4d596ca0f45SHA-256: b747c88bf588ba5dda537ffa38f0e1d9f58b0c4da8b39ddcb22945f600d97c5d mod_auth_mellon-debuginfo-0.8.0-3.el6_6.ppc64.rpm     MD5: ad55e6cf244d0aa8a00742ee7cff8237SHA-256: 7fc490a87e75ef3b42bf72524dd006a586fc0fc1a082662c0e84d0c34db3d7ed   s390x: mod_auth_mellon-0.8.0-3.el6_6.s390x.rpm     MD5: 4e349806790a719ea0b7a98b3919df88SHA-256: 4478ceef76dd3adeaaacc09d6c96339b320f3257d4a6f7d1270d819d9fa52194 mod_auth_mellon-debuginfo-0.8.0-3.el6_6.s390x.rpm     MD5: f8b2ab875f7a63862f9ceb3506b5d0d7SHA-256: 8545c26fff748f0d1280249965fabce756222044ccf926d8b5acccd4eeb11d9c   x86_64: mod_auth_mellon-0.8.0-3.el6_6.x86_64.rpm     MD5: 49d0168c29630f6e1a3a302d93835665SHA-256: df9912f51e1d840a3f634abafd183e369adde3f4a78795367a2e91f77288ee34 mod_auth_mellon-debuginfo-0.8.0-3.el6_6.x86_64.rpm     MD5: 48fe6880005ef1854eeb818c1b652ef8SHA-256: 59069ba3bcca956db5107161dd9b9f19b1e91bd47aaff6911919cb086f6785d9   Red Hat Enterprise Linux Server EUS (v. 6.6.z) SRPMS: mod_auth_mellon-0.8.0-3.el6_6.src.rpm     MD5: ca089b4f4677a31329612be2dc851fc0SHA-256: 7b22f6755293b117548f107b52044070fa573d6455b23d1336e85c83f150ba23   IA-32: mod_auth_mellon-0.8.0-3.el6_6.i686.rpm     MD5: afd1129cbbce483b2b4dff61e72300c6SHA-256: 725617a0f812cde89238967aa48af710a52976d646165fd83385116bd74b85be mod_auth_mellon-debuginfo-0.8.0-3.el6_6.i686.rpm     MD5: 5fc2d1e8cb8165ae13c6d382ec972d92SHA-256: b3e8ffe96420ae4913bb2366d49b52b2e49a74c0de02ad299097d9c9cc7a9429   PPC: mod_auth_mellon-0.8.0-3.el6_6.ppc64.rpm     MD5: fa3b5f0e4f173cde8b01f4d596ca0f45SHA-256: b747c88bf588ba5dda537ffa38f0e1d9f58b0c4da8b39ddcb22945f600d97c5d mod_auth_mellon-debuginfo-0.8.0-3.el6_6.ppc64.rpm     MD5: ad55e6cf244d0aa8a00742ee7cff8237SHA-256: 7fc490a87e75ef3b42bf72524dd006a586fc0fc1a082662c0e84d0c34db3d7ed   s390x: mod_auth_mellon-0.8.0-3.el6_6.s390x.rpm     MD5: 4e349806790a719ea0b7a98b3919df88SHA-256: 4478ceef76dd3adeaaacc09d6c96339b320f3257d4a6f7d1270d819d9fa52194 mod_auth_mellon-debuginfo-0.8.0-3.el6_6.s390x.rpm     MD5: f8b2ab875f7a63862f9ceb3506b5d0d7SHA-256: 8545c26fff748f0d1280249965fabce756222044ccf926d8b5acccd4eeb11d9c   x86_64: mod_auth_mellon-0.8.0-3.el6_6.x86_64.rpm     MD5: 49d0168c29630f6e1a3a302d93835665SHA-256: df9912f51e1d840a3f634abafd183e369adde3f4a78795367a2e91f77288ee34 mod_auth_mellon-debuginfo-0.8.0-3.el6_6.x86_64.rpm     MD5: 48fe6880005ef1854eeb818c1b652ef8SHA-256: 59069ba3bcca956db5107161dd9b9f19b1e91bd47aaff6911919cb086f6785d9   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: mod_auth_mellon-0.8.0-3.el6_6.src.rpm     MD5: ca089b4f4677a31329612be2dc851fc0SHA-256: 7b22f6755293b117548f107b52044070fa573d6455b23d1336e85c83f150ba23   IA-32: mod_auth_mellon-0.8.0-3.el6_6.i686.rpm     MD5: afd1129cbbce483b2b4dff61e72300c6SHA-256: 725617a0f812cde89238967aa48af710a52976d646165fd83385116bd74b85be mod_auth_mellon-debuginfo-0.8.0-3.el6_6.i686.rpm     MD5: 5fc2d1e8cb8165ae13c6d382ec972d92SHA-256: b3e8ffe96420ae4913bb2366d49b52b2e49a74c0de02ad299097d9c9cc7a9429   x86_64: mod_auth_mellon-0.8.0-3.el6_6.x86_64.rpm     MD5: 49d0168c29630f6e1a3a302d93835665SHA-256: df9912f51e1d840a3f634abafd183e369adde3f4a78795367a2e91f77288ee34 mod_auth_mellon-debuginfo-0.8.0-3.el6_6.x86_64.rpm     MD5: 48fe6880005ef1854eeb818c1b652ef8SHA-256: 59069ba3bcca956db5107161dd9b9f19b1e91bd47aaff6911919cb086f6785d9   (The unlinked packages above are only available from the Red Hat Network) 1157281 - CVE-2014-8566 mod_auth_mellon: remote memory disclosure flaw1157954 - CVE-2014-8567 mod_auth_mellon: logout processing leads to denial of service These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
An updated mod_wsgi package that fixes one security issue is now availablefor Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section. The mod_wsgi adapter is an Apache module that provides a WSGI-compliantinterface for hosting Python-based web applications within Apache.It was found that mod_wsgi did not properly drop privileges if the call tosetuid() failed. If mod_wsgi was set up to allow unprivileged users to runWSGI applications, a local user able to run a WSGI application couldpossibly use this flaw to escalate their privileges on the system.(CVE-2014-0240)Note: mod_wsgi is not intended to provide privilege separation for WSGIapplications. Systems relying on mod_wsgi to limit or sandbox theprivileges of mod_wsgi applications should migrate to a different solutionwith proper privilege separation.Red Hat would like to thank Graham Dumpleton for reporting this issue.Upstream acknowledges Róbert Kisteleki as the original reporter.All mod_wsgi users are advised to upgrade to this updated package, whichcontains a backported patch to correct this issue. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7) SRPMS: mod_wsgi-3.4-12.el7_0.src.rpm     MD5: c6d36192e712f897840484c879858ceeSHA-256: 4a7e40b9e47622eea096462e2f71b230e5178f90315dd6dd1437b54def9473cd   x86_64: mod_wsgi-3.4-12.el7_0.x86_64.rpm     MD5: 2d6c9314f619a9c1a342b432056af76cSHA-256: 544d095cf1d1cb7f5d9aee84f80f938632c15ab4f2bffe0dc2bcdfa33d95a62f mod_wsgi-debuginfo-3.4-12.el7_0.x86_64.rpm     MD5: 560e61637f2fc278b8cb19af67069e6eSHA-256: bc26efed2bf16c5e1bb154756d6e6601a0fcfc2c54fd84def251ac8aadb06f71   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: mod_wsgi-3.4-12.el7_0.src.rpm     MD5: c6d36192e712f897840484c879858ceeSHA-256: 4a7e40b9e47622eea096462e2f71b230e5178f90315dd6dd1437b54def9473cd   x86_64: mod_wsgi-3.4-12.el7_0.x86_64.rpm     MD5: 2d6c9314f619a9c1a342b432056af76cSHA-256: 544d095cf1d1cb7f5d9aee84f80f938632c15ab4f2bffe0dc2bcdfa33d95a62f mod_wsgi-debuginfo-3.4-12.el7_0.x86_64.rpm     MD5: 560e61637f2fc278b8cb19af67069e6eSHA-256: bc26efed2bf16c5e1bb154756d6e6601a0fcfc2c54fd84def251ac8aadb06f71   Red Hat Enterprise Linux Server (v. 7) SRPMS: mod_wsgi-3.4-12.el7_0.src.rpm     MD5: c6d36192e712f897840484c879858ceeSHA-256: 4a7e40b9e47622eea096462e2f71b230e5178f90315dd6dd1437b54def9473cd   PPC: mod_wsgi-3.4-12.el7_0.ppc64.rpm     MD5: 7367039ff7f9488ee6b1ead5f7e11b16SHA-256: d28088b06016d804962dc648d8a860d9a3cf82499be59ba92c0c821cb195f176 mod_wsgi-debuginfo-3.4-12.el7_0.ppc64.rpm     MD5: 78b863903ee65acebdfd669022fc0286SHA-256: 119c99586e57bf7be00abd525ca94139b7866da724913f1460c1c513d4490c31   s390x: mod_wsgi-3.4-12.el7_0.s390x.rpm     MD5: fae9267768018a551437898ca7ae82b3SHA-256: b2f4f89087cd6eb7d7e06e34209f51ec1b765ffd16f0c3d1398b7768b1d959c8 mod_wsgi-debuginfo-3.4-12.el7_0.s390x.rpm     MD5: e0c40c190c15c0416f9df0ec0c07774fSHA-256: 0b29b9848201a82dba6d8e300c626c3f1acfa20d7fef48a658eb76fcb8128360   x86_64: mod_wsgi-3.4-12.el7_0.x86_64.rpm     MD5: 2d6c9314f619a9c1a342b432056af76cSHA-256: 544d095cf1d1cb7f5d9aee84f80f938632c15ab4f2bffe0dc2bcdfa33d95a62f mod_wsgi-debuginfo-3.4-12.el7_0.x86_64.rpm     MD5: 560e61637f2fc278b8cb19af67069e6eSHA-256: bc26efed2bf16c5e1bb154756d6e6601a0fcfc2c54fd84def251ac8aadb06f71   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: mod_wsgi-3.4-12.el7_0.src.rpm     MD5: c6d36192e712f897840484c879858ceeSHA-256: 4a7e40b9e47622eea096462e2f71b230e5178f90315dd6dd1437b54def9473cd   x86_64: mod_wsgi-3.4-12.el7_0.x86_64.rpm     MD5: 2d6c9314f619a9c1a342b432056af76cSHA-256: 544d095cf1d1cb7f5d9aee84f80f938632c15ab4f2bffe0dc2bcdfa33d95a62f mod_wsgi-debuginfo-3.4-12.el7_0.x86_64.rpm     MD5: 560e61637f2fc278b8cb19af67069e6eSHA-256: bc26efed2bf16c5e1bb154756d6e6601a0fcfc2c54fd84def251ac8aadb06f71   (The unlinked packages above are only available from the Red Hat Network) 1101863 - CVE-2014-0240 mod_wsgi: possible privilege escalation in setuid() failure scenarios These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
The Ministry of Defence (MoD) has announced £2m in sponsorship for a competition to find innovative ways of automating cyber defences. The MoD recognises that once a system is compromised, a cyber attack can quickly escalate, and so it believes automated responses are an essential part of cyber defence processes. An automated cyber defence response includes collecting information, identifying the attack, analysing potential courses of action and then responding. The funding will be split equally between two phases of the competition to identify winning proof-of-concept research proposals for automated responses to threats to MoD computer systems. Phase 1 of the competition will be launched by the Defence Science and Technology Laboratory’s Centre for Defence Enterprise (CDE) in London on 9 September 2014. The CDE provides a way for the MoD to assess the thinking and capabilities of science and technology providers and aims to remove barriers for SMEs to enter the defence supply chain. Technology industry representatives and academics are invited to register for the launch event to find out more about the competition and discuss ideas that could benefit the UK’s defence security. In phase 2, funding will be awarded on a per-project basis to the most successful outputs of projects funded in phase 1. “Our armed forces rely on cyberspace to conduct successful operations and the £2m funding available for this competition demonstrates the MoD’s commitment to cyber defence,” said Jim Pennycook, head of operations at the CDE. “Automated responses are an essential part of cyber defence processes and this funding will allow us to support a range of innovative proposals in this area,” he added. Proposals must be submitted through the CDE portal before the competition closes at 5pm on Thursday 23 October 2014. According to the MoD, the CDE has received more than 5,100 research proposals since it was established in May 2008. More than 850 proposals have been selected for funding, comprising a total contract value of £48m, with almost half of those contracts awarded to SMEs. In 2010, the US military launched an initiative to automate its computer defences to compensate for the shortage in the number of infosecurity experts it could train as cyber warriors. The initiative, which used situational awareness tools and network sensors and automating patch management systems, was aimed at establishing a baseline to make it easier to identify malicious activity without relying on manually intensive processes. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK
Updated python27-mod_wsgi and python33-mod_wsgi packages that fix onesecurity issue are now available for Red Hat Software Collections 1.The Red Hat Security Response Team has rated this update as havingImportant security impact. A Common Vulnerability Scoring System (CVSS)base score, which gives a detailed severity rating, is available from theCVE link in the References section. The mod_wsgi adapter is an Apache module that provides a WSGI-compliantinterface for hosting Python-based web applications within Apache.It was found that mod_wsgi did not properly drop privileges if the call tosetuid() failed. If mod_wsgi was set up to allow unprivileged users to runWSGI applications, a local user able to run a WSGI application couldpossibly use this flaw to escalate their privileges on the system.(CVE-2014-0240)Note: mod_wsgi is not intended to provide privilege separation for WSGIapplications. Systems relying on mod_wsgi to limit or sandbox theprivileges of mod_wsgi applications should migrate to a different solutionwith proper privilege separation.Red Hat would like to thank Graham Dumpleton for reporting this issue.Upstream acknowledges Róbert Kisteleki as the original reporter of thisissue.All python27-mod_wsgi and python33-mod_wsgi users are advised to upgrade tothese updated packages, which contain a backported patch to correct thisissue. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Software Collections 1 for RHEL 6 SRPMS: python27-mod_wsgi-3.4-12.el6.src.rpm     MD5: 7d8a820ae8605295d0ad73d91f046117SHA-256: c2abab1ecebfba2aed5bb4c355cbf0a26b1ebd658c3b117944afc3476aa30f63 python33-mod_wsgi-3.4-14.el6.src.rpm     MD5: 9e66acb3ad50561bd74c8acec559323bSHA-256: f65825ac4ea7aff1e4fb009aa2fa3646381633b0106a6553aba5f3e46ac388a3   x86_64: python27-mod_wsgi-3.4-12.el6.x86_64.rpm     MD5: 718bdf3db31879f120d422ead510f7c9SHA-256: 15ead7670d8d7d66f45b0e5b99ed7d804ec2ecfba50bf2f0aa726ee4830742c7 python27-mod_wsgi-debuginfo-3.4-12.el6.x86_64.rpm     MD5: e0171fd0e7d5116f5a191871ff41e798SHA-256: d4ca82a01608c67a19cd3d22f563b9f8eed805f9a9bdda2b1e30d1f6de9afbd2 python33-mod_wsgi-3.4-14.el6.x86_64.rpm     MD5: 31ea2ebe5416518dcb0ceca04e115445SHA-256: 191d108198d1ccdf8e9e69995762b5a2c840d9e8d7137093d42a9207afa63e0c python33-mod_wsgi-debuginfo-3.4-14.el6.x86_64.rpm     MD5: 7ab540f58ba1e0e52f5ca32107fc84d2SHA-256: 92f1dc27a2cb3284d49392085961232cc4d9b8a782000e19f32f08853a43ab79   (The unlinked packages above are only available from the Red Hat Network) 1101863 - CVE-2014-0240 mod_wsgi: possible privilege escalation in setuid() failure scenarios These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
An updated mod_wsgi package that fixes two security issues is now availablefor Red Hat Enterprise Linux 6.The Red Hat Security Response Team has rated this update as havingImportant security impact. Common Vulnerability Scoring System (CVSS) basescores, which give detailed severity ratings, are available for eachvulnerability from the CVE links in the References section. The mod_wsgi adapter is an Apache module that provides a WSGI-compliantinterface for hosting Python-based web applications within Apache.It was found that mod_wsgi did not properly drop privileges if the call tosetuid() failed. If mod_wsgi was set up to allow unprivileged users to runWSGI applications, a local user able to run a WSGI application couldpossibly use this flaw to escalate their privileges on the system.(CVE-2014-0240)Note: mod_wsgi is not intended to provide privilege separation for WSGIapplications. Systems relying on mod_wsgi to limit or sandbox theprivileges of mod_wsgi applications should migrate to a different solutionwith proper privilege separation.It was discovered that mod_wsgi could leak memory of a hosted webapplication via the "Content-Type" header. A remote attacker could possiblyuse this flaw to disclose limited portions of the web application's memory.(CVE-2014-0242)Red Hat would like to thank Graham Dumpleton for reporting these issues.Upstream acknowledges Róbert Kisteleki as the original reporter ofCVE-2014-0240, and Buck Golemon as the original reporter of CVE-2014-0242.All mod_wsgi users are advised to upgrade to this updated package, whichcontains backported patches to correct these issues. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: mod_wsgi-3.2-6.el6_5.src.rpm     MD5: 792be52c2ae2d73b53b59b8e6e02eec4SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62   IA-32: mod_wsgi-3.2-6.el6_5.i686.rpm     MD5: abb236879826909ad093bc4cc3584c42SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm     MD5: 023c2a89d0a0608e31031b5df913a4d3SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd   x86_64: mod_wsgi-3.2-6.el6_5.x86_64.rpm     MD5: c20f4e1728ef657a8e13341ff9a52403SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm     MD5: 6b354b0778c31ef0d070f031a8ecab65SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: mod_wsgi-3.2-6.el6_5.src.rpm     MD5: 792be52c2ae2d73b53b59b8e6e02eec4SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62   x86_64: mod_wsgi-3.2-6.el6_5.x86_64.rpm     MD5: c20f4e1728ef657a8e13341ff9a52403SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm     MD5: 6b354b0778c31ef0d070f031a8ecab65SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f   Red Hat Enterprise Linux Server (v. 6) SRPMS: mod_wsgi-3.2-6.el6_5.src.rpm     MD5: 792be52c2ae2d73b53b59b8e6e02eec4SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62   IA-32: mod_wsgi-3.2-6.el6_5.i686.rpm     MD5: abb236879826909ad093bc4cc3584c42SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm     MD5: 023c2a89d0a0608e31031b5df913a4d3SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd   PPC: mod_wsgi-3.2-6.el6_5.ppc64.rpm     MD5: b0e448e97e69c495ecea6d394c387a90SHA-256: 3c9c2ae7d737a1edef51f977308371a1debff421d2cde7fc91f9c2bf5e456c44 mod_wsgi-debuginfo-3.2-6.el6_5.ppc64.rpm     MD5: 106a2db20dfa5d7ae7e75974b418bb47SHA-256: 20ba63130cfae25b7bf889fc1497b1d723921449df14d8df77d3cce18206b6b7   s390x: mod_wsgi-3.2-6.el6_5.s390x.rpm     MD5: e2adcb55e7761276841af80194d3d9adSHA-256: 30f9784326f76a6fd79ce9e41d79801af2f16d7befc758071974c2acfb0ddc66 mod_wsgi-debuginfo-3.2-6.el6_5.s390x.rpm     MD5: 2be5d8269320ff98d9853571afd9f2d8SHA-256: e4579341cf872a5b0a2ff803023dbef5bd5bf56a2a2b51c8622302d2aa1b3a6f   x86_64: mod_wsgi-3.2-6.el6_5.x86_64.rpm     MD5: c20f4e1728ef657a8e13341ff9a52403SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm     MD5: 6b354b0778c31ef0d070f031a8ecab65SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: mod_wsgi-3.2-6.el6_5.src.rpm     MD5: 792be52c2ae2d73b53b59b8e6e02eec4SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62   x86_64: mod_wsgi-3.2-6.el6_5.x86_64.rpm     MD5: c20f4e1728ef657a8e13341ff9a52403SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm     MD5: 6b354b0778c31ef0d070f031a8ecab65SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: mod_wsgi-3.2-6.el6_5.src.rpm     MD5: 792be52c2ae2d73b53b59b8e6e02eec4SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62   IA-32: mod_wsgi-3.2-6.el6_5.i686.rpm     MD5: abb236879826909ad093bc4cc3584c42SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm     MD5: 023c2a89d0a0608e31031b5df913a4d3SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd   PPC: mod_wsgi-3.2-6.el6_5.ppc64.rpm     MD5: b0e448e97e69c495ecea6d394c387a90SHA-256: 3c9c2ae7d737a1edef51f977308371a1debff421d2cde7fc91f9c2bf5e456c44 mod_wsgi-debuginfo-3.2-6.el6_5.ppc64.rpm     MD5: 106a2db20dfa5d7ae7e75974b418bb47SHA-256: 20ba63130cfae25b7bf889fc1497b1d723921449df14d8df77d3cce18206b6b7   s390x: mod_wsgi-3.2-6.el6_5.s390x.rpm     MD5: e2adcb55e7761276841af80194d3d9adSHA-256: 30f9784326f76a6fd79ce9e41d79801af2f16d7befc758071974c2acfb0ddc66 mod_wsgi-debuginfo-3.2-6.el6_5.s390x.rpm     MD5: 2be5d8269320ff98d9853571afd9f2d8SHA-256: e4579341cf872a5b0a2ff803023dbef5bd5bf56a2a2b51c8622302d2aa1b3a6f   x86_64: mod_wsgi-3.2-6.el6_5.x86_64.rpm     MD5: c20f4e1728ef657a8e13341ff9a52403SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm     MD5: 6b354b0778c31ef0d070f031a8ecab65SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: mod_wsgi-3.2-6.el6_5.src.rpm     MD5: 792be52c2ae2d73b53b59b8e6e02eec4SHA-256: 2a3d3543f6f60afbf90456a8dc882807d237d60101bd93aab22b4d173ff8bf62   IA-32: mod_wsgi-3.2-6.el6_5.i686.rpm     MD5: abb236879826909ad093bc4cc3584c42SHA-256: 0f30165c342c23cbfd955431ee9b40db51f25e948800eb3604b01bef641d638d mod_wsgi-debuginfo-3.2-6.el6_5.i686.rpm     MD5: 023c2a89d0a0608e31031b5df913a4d3SHA-256: ccfdada703583036a324a0a99676ec2c158112ad9ff243d8fbb429b29bee75bd   x86_64: mod_wsgi-3.2-6.el6_5.x86_64.rpm     MD5: c20f4e1728ef657a8e13341ff9a52403SHA-256: 379ed0ef7878bbf2eb421d4692a9d7b01ceeb047ef130c63c074d53330c6ec67 mod_wsgi-debuginfo-3.2-6.el6_5.x86_64.rpm     MD5: 6b354b0778c31ef0d070f031a8ecab65SHA-256: 2dccfef62cae29819edb3a083b18f8fadb63ded570e9c3162ca80687f747764f   (The unlinked packages above are only available from the Red Hat Network) 1101863 - CVE-2014-0240 mod_wsgi: possible privilege escalation in setuid() failure scenarios1101873 - CVE-2014-0242 mod_wsgi: information leak These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Updated mod_perl packages that fix one bug are now available for Red HatEnterprise Linux 6. The mod_perl packages provide an embedded Perl interpreter for the Apache HTTPServer that speeds up CGI script processing because no external Perl interpreterhas to be started.This update fixes the following bug:* A race condition was discovered in the way mod_perl handled thread pools. As aconsequence, a thread-based Apache HTTP Server configuration that used mod_perland the Apache MPM worker module sometimes become unresponsive when processing arequest. With this update, the race condition has been removed and the ApacheHTTP Sever no longer hangs in the described scenario (BZ#1088777)Users of mod_perl are advised to upgrade to these updated packages, which fixthis bug. Red Hat Enterprise Linux Desktop (v. 6) SRPMS: mod_perl-2.0.4-11.el6_5.src.rpm     MD5: 20f1e5f44e96eebc397b12e3969665efSHA-256: 9dbaa2373a5c44bcb805ff08492f7391cd36ebccfac742b801c4e3e0b383154c   IA-32: mod_perl-2.0.4-11.el6_5.i686.rpm     MD5: 7471194c7da871f79f940da57ff4889eSHA-256: 6e979ebc3525ccc02ebc2ec45b7744dd23af8c5a6f7ad98b280180bd0bcdcad3 mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c   x86_64: mod_perl-2.0.4-11.el6_5.x86_64.rpm     MD5: 367fba1768cdfd755ff06fcadb10b4c2SHA-256: 4957384f2b016d60a49ac6057581ce88a5ffee46b4ccf8464bae38f73ad434ef mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-debuginfo-2.0.4-11.el6_5.x86_64.rpm     MD5: dfd6b7c001dfb0492d9729fb30df8dc3SHA-256: 4743b206d6c654c9c83bf2242bc2bc8b16e5198f6404d844d47df92ee6979f13 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c mod_perl-devel-2.0.4-11.el6_5.x86_64.rpm     MD5: c2e12d4869fc4da090d7ed1444ec8c2fSHA-256: b7961fc5ed3af5f9f0ed869d4dae3384140f7667518c91ef0b51e27bdbc78aa4   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: mod_perl-2.0.4-11.el6_5.src.rpm     MD5: 20f1e5f44e96eebc397b12e3969665efSHA-256: 9dbaa2373a5c44bcb805ff08492f7391cd36ebccfac742b801c4e3e0b383154c   x86_64: mod_perl-2.0.4-11.el6_5.x86_64.rpm     MD5: 367fba1768cdfd755ff06fcadb10b4c2SHA-256: 4957384f2b016d60a49ac6057581ce88a5ffee46b4ccf8464bae38f73ad434ef mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-debuginfo-2.0.4-11.el6_5.x86_64.rpm     MD5: dfd6b7c001dfb0492d9729fb30df8dc3SHA-256: 4743b206d6c654c9c83bf2242bc2bc8b16e5198f6404d844d47df92ee6979f13 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c mod_perl-devel-2.0.4-11.el6_5.x86_64.rpm     MD5: c2e12d4869fc4da090d7ed1444ec8c2fSHA-256: b7961fc5ed3af5f9f0ed869d4dae3384140f7667518c91ef0b51e27bdbc78aa4   Red Hat Enterprise Linux Server (v. 6) SRPMS: mod_perl-2.0.4-11.el6_5.src.rpm     MD5: 20f1e5f44e96eebc397b12e3969665efSHA-256: 9dbaa2373a5c44bcb805ff08492f7391cd36ebccfac742b801c4e3e0b383154c   IA-32: mod_perl-2.0.4-11.el6_5.i686.rpm     MD5: 7471194c7da871f79f940da57ff4889eSHA-256: 6e979ebc3525ccc02ebc2ec45b7744dd23af8c5a6f7ad98b280180bd0bcdcad3 mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c   PPC: mod_perl-2.0.4-11.el6_5.ppc64.rpm     MD5: 1fcc3533f35e844b5bad24706320f12cSHA-256: da6df76e69ddfc096a776db06b191845e4382a9fccba2bf2d8bbf62619be7f70 mod_perl-debuginfo-2.0.4-11.el6_5.ppc.rpm     MD5: 2f08d1be567871e8d40af5b41a672ae5SHA-256: 4ba067fe132a335da4c15f10f1ff4f8ca7e0ac5f72e2233b9dd7fd60fe9ab4b0 mod_perl-debuginfo-2.0.4-11.el6_5.ppc64.rpm     MD5: b10dc2173de399a5b359132b0fb28bb4SHA-256: 1a12b3e72bf0151d7cab18e379241227b6387673e07905f859a155a61f4329d0 mod_perl-devel-2.0.4-11.el6_5.ppc.rpm     MD5: 6099a7c23ba191ca47c8b0cd90889029SHA-256: d978217cac76f91e5c766f21471259a2db16a6317d1f82625ff3b5f71157ac81 mod_perl-devel-2.0.4-11.el6_5.ppc64.rpm     MD5: 10cd802deb8195399377ffff16751c35SHA-256: 67a5ccf4bdfcdd51b8d7e2fdd4213ad0b45826f78de4f728fb7215c7589b8b71   s390x: mod_perl-2.0.4-11.el6_5.s390x.rpm     MD5: 2cd0f13c8c41e0f5fb82be24ad2b9226SHA-256: b3111580ed1a2b00ff68f4f3ec1f46c3ebd43330b16c0376655b135b58241ccb mod_perl-debuginfo-2.0.4-11.el6_5.s390.rpm     MD5: 2e3b146f1d6005b95993327c0ce2a1a4SHA-256: b67093a306f2cf31d2344e2b439faae305b15c876d97c436d533f42645b86615 mod_perl-debuginfo-2.0.4-11.el6_5.s390x.rpm     MD5: a346079c6ec6797daa78fc3ee28b3d6dSHA-256: 0ae48c8c5bcdfc19af9aee5295e51074fff8b00c1c0feff2659b4afa0e341704 mod_perl-devel-2.0.4-11.el6_5.s390.rpm     MD5: ba06465a4dff81354849b08637852897SHA-256: 4f07885e514739c934fd9f264a89eb1b1a347f022f0cc42636c5bb8e7c36f4f5 mod_perl-devel-2.0.4-11.el6_5.s390x.rpm     MD5: e0960de19c4f5cc1f253d35af545136bSHA-256: 2d30fdcb5240973f8015336178e614f28512a9e46e710aac304ead83133e7d95   x86_64: mod_perl-2.0.4-11.el6_5.x86_64.rpm     MD5: 367fba1768cdfd755ff06fcadb10b4c2SHA-256: 4957384f2b016d60a49ac6057581ce88a5ffee46b4ccf8464bae38f73ad434ef mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-debuginfo-2.0.4-11.el6_5.x86_64.rpm     MD5: dfd6b7c001dfb0492d9729fb30df8dc3SHA-256: 4743b206d6c654c9c83bf2242bc2bc8b16e5198f6404d844d47df92ee6979f13 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c mod_perl-devel-2.0.4-11.el6_5.x86_64.rpm     MD5: c2e12d4869fc4da090d7ed1444ec8c2fSHA-256: b7961fc5ed3af5f9f0ed869d4dae3384140f7667518c91ef0b51e27bdbc78aa4   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: mod_perl-2.0.4-11.el6_5.src.rpm     MD5: 20f1e5f44e96eebc397b12e3969665efSHA-256: 9dbaa2373a5c44bcb805ff08492f7391cd36ebccfac742b801c4e3e0b383154c   x86_64: mod_perl-2.0.4-11.el6_5.x86_64.rpm     MD5: 367fba1768cdfd755ff06fcadb10b4c2SHA-256: 4957384f2b016d60a49ac6057581ce88a5ffee46b4ccf8464bae38f73ad434ef mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-debuginfo-2.0.4-11.el6_5.x86_64.rpm     MD5: dfd6b7c001dfb0492d9729fb30df8dc3SHA-256: 4743b206d6c654c9c83bf2242bc2bc8b16e5198f6404d844d47df92ee6979f13 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c mod_perl-devel-2.0.4-11.el6_5.x86_64.rpm     MD5: c2e12d4869fc4da090d7ed1444ec8c2fSHA-256: b7961fc5ed3af5f9f0ed869d4dae3384140f7667518c91ef0b51e27bdbc78aa4   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: mod_perl-2.0.4-11.el6_5.src.rpm     MD5: 20f1e5f44e96eebc397b12e3969665efSHA-256: 9dbaa2373a5c44bcb805ff08492f7391cd36ebccfac742b801c4e3e0b383154c   IA-32: mod_perl-2.0.4-11.el6_5.i686.rpm     MD5: 7471194c7da871f79f940da57ff4889eSHA-256: 6e979ebc3525ccc02ebc2ec45b7744dd23af8c5a6f7ad98b280180bd0bcdcad3 mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c   PPC: mod_perl-2.0.4-11.el6_5.ppc64.rpm     MD5: 1fcc3533f35e844b5bad24706320f12cSHA-256: da6df76e69ddfc096a776db06b191845e4382a9fccba2bf2d8bbf62619be7f70 mod_perl-debuginfo-2.0.4-11.el6_5.ppc.rpm     MD5: 2f08d1be567871e8d40af5b41a672ae5SHA-256: 4ba067fe132a335da4c15f10f1ff4f8ca7e0ac5f72e2233b9dd7fd60fe9ab4b0 mod_perl-debuginfo-2.0.4-11.el6_5.ppc64.rpm     MD5: b10dc2173de399a5b359132b0fb28bb4SHA-256: 1a12b3e72bf0151d7cab18e379241227b6387673e07905f859a155a61f4329d0 mod_perl-devel-2.0.4-11.el6_5.ppc.rpm     MD5: 6099a7c23ba191ca47c8b0cd90889029SHA-256: d978217cac76f91e5c766f21471259a2db16a6317d1f82625ff3b5f71157ac81 mod_perl-devel-2.0.4-11.el6_5.ppc64.rpm     MD5: 10cd802deb8195399377ffff16751c35SHA-256: 67a5ccf4bdfcdd51b8d7e2fdd4213ad0b45826f78de4f728fb7215c7589b8b71   s390x: mod_perl-2.0.4-11.el6_5.s390x.rpm     MD5: 2cd0f13c8c41e0f5fb82be24ad2b9226SHA-256: b3111580ed1a2b00ff68f4f3ec1f46c3ebd43330b16c0376655b135b58241ccb mod_perl-debuginfo-2.0.4-11.el6_5.s390.rpm     MD5: 2e3b146f1d6005b95993327c0ce2a1a4SHA-256: b67093a306f2cf31d2344e2b439faae305b15c876d97c436d533f42645b86615 mod_perl-debuginfo-2.0.4-11.el6_5.s390x.rpm     MD5: a346079c6ec6797daa78fc3ee28b3d6dSHA-256: 0ae48c8c5bcdfc19af9aee5295e51074fff8b00c1c0feff2659b4afa0e341704 mod_perl-devel-2.0.4-11.el6_5.s390.rpm     MD5: ba06465a4dff81354849b08637852897SHA-256: 4f07885e514739c934fd9f264a89eb1b1a347f022f0cc42636c5bb8e7c36f4f5 mod_perl-devel-2.0.4-11.el6_5.s390x.rpm     MD5: e0960de19c4f5cc1f253d35af545136bSHA-256: 2d30fdcb5240973f8015336178e614f28512a9e46e710aac304ead83133e7d95   x86_64: mod_perl-2.0.4-11.el6_5.x86_64.rpm     MD5: 367fba1768cdfd755ff06fcadb10b4c2SHA-256: 4957384f2b016d60a49ac6057581ce88a5ffee46b4ccf8464bae38f73ad434ef mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-debuginfo-2.0.4-11.el6_5.x86_64.rpm     MD5: dfd6b7c001dfb0492d9729fb30df8dc3SHA-256: 4743b206d6c654c9c83bf2242bc2bc8b16e5198f6404d844d47df92ee6979f13 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c mod_perl-devel-2.0.4-11.el6_5.x86_64.rpm     MD5: c2e12d4869fc4da090d7ed1444ec8c2fSHA-256: b7961fc5ed3af5f9f0ed869d4dae3384140f7667518c91ef0b51e27bdbc78aa4   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: mod_perl-2.0.4-11.el6_5.src.rpm     MD5: 20f1e5f44e96eebc397b12e3969665efSHA-256: 9dbaa2373a5c44bcb805ff08492f7391cd36ebccfac742b801c4e3e0b383154c   IA-32: mod_perl-2.0.4-11.el6_5.i686.rpm     MD5: 7471194c7da871f79f940da57ff4889eSHA-256: 6e979ebc3525ccc02ebc2ec45b7744dd23af8c5a6f7ad98b280180bd0bcdcad3 mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c   x86_64: mod_perl-2.0.4-11.el6_5.x86_64.rpm     MD5: 367fba1768cdfd755ff06fcadb10b4c2SHA-256: 4957384f2b016d60a49ac6057581ce88a5ffee46b4ccf8464bae38f73ad434ef mod_perl-debuginfo-2.0.4-11.el6_5.i686.rpm     MD5: 57a669844c71059fecfc9cca4ca1abf2SHA-256: 10adb8163ffa2dd2d494a4c50763ce14da8ea49a550e7cd447339cdfa7ea0940 mod_perl-debuginfo-2.0.4-11.el6_5.x86_64.rpm     MD5: dfd6b7c001dfb0492d9729fb30df8dc3SHA-256: 4743b206d6c654c9c83bf2242bc2bc8b16e5198f6404d844d47df92ee6979f13 mod_perl-devel-2.0.4-11.el6_5.i686.rpm     MD5: 938cb3e7b9ef51a6979f2f3e0347a604SHA-256: 9f900a1b26ef5951ecfe2d3b9678b272d6fd58d4a74f6a16b2c0c75f6d9b215c mod_perl-devel-2.0.4-11.el6_5.x86_64.rpm     MD5: c2e12d4869fc4da090d7ed1444ec8c2fSHA-256: b7961fc5ed3af5f9f0ed869d4dae3384140f7667518c91ef0b51e27bdbc78aa4   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: