ELSA-2013-0130

ELSA-2013-0130 - httpd security, bug fix, and enhancement update

Type:SECURITY
Severity:LOW
Release Date:2013-01-11

Description


[2.2.3-74.0.1.el5]
- fix mod_ssl always performing full renegotiation (Joe Jin) [orabug 12423387]
- replace index.html with Oracle's index page oracle_index.html
- update vstring and distro in specfile

[2.2.3-74]
- further %post scriptlet fix (#752618, #867736)

[2.2.3-73]
- fix %post scriptlet output (#752618, #867736)

[2.2.3-72]
- add security fix for CVE-2008-0456

[2.2.3-71]
- add security fix for CVE-2012-2687 (#850794)

[2.2.3-70]
- relax checks for status-line validity (#853128)

[2.2.3-69]
- mod_cache: fix header merging for 304 case, thanks to Roy Badami (#845532)
- correct CVE reference in old changelog entry (#849160)

[2.2.3-68]
- mod_ssl: add _userID DN variable suffix for NID_userId (#840036)
- fix handling of long chunk-line (#840845)
- omit %posttrans daemon restart if
/etc/sysconfig/httpd-disable-posttrans exists (#833042)

[2.2.3-67]
- add server aliases to 'httpd -S' output (#833043)
- LSB compliance fixes for init script (#783242)
- mod_ldap: add LDAPReferrals directive alias (#727342)

[2.2.3-66]
- check if localhost.key is valid (#752618)
- mod_proxy_ajp: honour ProxyErrorOverride (#767890)
- mod_ssl: fixed start with FIPS 140-2 mode enabled (#773473)


Related CVEs


CVE-2008-0455
CVE-2008-0456
CVE-2012-2687

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) httpd-2.2.3-74.0.1.el5.src.rpmadba5036b99bf0a23060343a68371386ELSA-2016-1421
httpd-2.2.3-74.0.1.el5.i386.rpmcdb2c98d9123632164a08dae0fa1f25aELSA-2016-1421
httpd-devel-2.2.3-74.0.1.el5.i386.rpmc9a84103b50b68399421aa228e43a305ELSA-2016-1421
httpd-manual-2.2.3-74.0.1.el5.i386.rpme0987d7296fe925404525f2512ea652dELSA-2016-1421
mod_ssl-2.2.3-74.0.1.el5.i386.rpm8c9dced59d6abd51fb70ad432effb2daELSA-2016-1421
Oracle Linux 5 (ia64) httpd-2.2.3-74.0.1.el5.src.rpmadba5036b99bf0a23060343a68371386ELSA-2016-1421
httpd-2.2.3-74.0.1.el5.ia64.rpm685885dbad014d4d8e826fb54f8b8827ELSA-2016-1421
httpd-devel-2.2.3-74.0.1.el5.ia64.rpm5ad44f26feda1679fe716e2a3d5f45acELSA-2016-1421
httpd-manual-2.2.3-74.0.1.el5.ia64.rpm3ddb7a8ae2b3b891690db6f67a9f653fELSA-2016-1421
mod_ssl-2.2.3-74.0.1.el5.ia64.rpm1ba658b9c8a825b0c9d2788aed8e8dc9ELSA-2016-1421
Oracle Linux 5 (x86_64) httpd-2.2.3-74.0.1.el5.src.rpmadba5036b99bf0a23060343a68371386ELSA-2016-1421
httpd-2.2.3-74.0.1.el5.x86_64.rpm1484d8a1b8625d1fa685d878f3e56384ELSA-2016-1421
httpd-devel-2.2.3-74.0.1.el5.i386.rpmc9a84103b50b68399421aa228e43a305ELSA-2016-1421
httpd-devel-2.2.3-74.0.1.el5.x86_64.rpm3556f5fc7f0f4280756591ebd8233704ELSA-2016-1421
httpd-manual-2.2.3-74.0.1.el5.x86_64.rpmef02d2c0e0e0e268da75313f60b386b8ELSA-2016-1421
mod_ssl-2.2.3-74.0.1.el5.x86_64.rpm4ccb6b535dce9b10d297d43ccd9f74c5ELSA-2016-1421



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete