ELSA-2009-1579

ELSA-2009-1579 - httpd security update

Type:SECURITY
Impact:MODERATE
Release Date:2009-11-11

Description



[2.2.3-31.0.1.el5_4.2]
- replace index.html with Oracle's index page oracle_index.html
- update vstring and distro in specfile

[2.2.3-31.2]
- add security fixes for CVE-2009-3094, CVE-2009-3095, CVE-2009-3555 (#534041)


Related CVEs


CVE-2009-3095
CVE-2009-3555
CVE-2009-3094

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 3 (i386) httpd-2.0.46-77.0.1.ent.src.rpm92b3720f523e985214268c750d00a03b3be7b430c7d0d17795985a0cf6a56a16-el3_i386_latest
httpd-2.0.46-77.0.1.ent.src.rpm92b3720f523e985214268c750d00a03b3be7b430c7d0d17795985a0cf6a56a16-el3_u9_i386_patch
httpd-2.0.46-77.0.1.ent.i386.rpm81a5daee49dd17dd9b01397c9a1741f14d816c49956e2bc669f091a1635669ac-el3_i386_latest
httpd-2.0.46-77.0.1.ent.i386.rpm81a5daee49dd17dd9b01397c9a1741f14d816c49956e2bc669f091a1635669ac-el3_u9_i386_patch
httpd-devel-2.0.46-77.0.1.ent.i386.rpm4764595650bcf6ec72a31b7de11a968bc9dbe8c285010c42f0951001d62ab361-el3_i386_latest
httpd-devel-2.0.46-77.0.1.ent.i386.rpm4764595650bcf6ec72a31b7de11a968bc9dbe8c285010c42f0951001d62ab361-el3_u9_i386_patch
mod_ssl-2.0.46-77.0.1.ent.i386.rpmed0ed17a8571c517467fea674bf23dd7f3f0e7a564f68831d16773f69330c92b-el3_i386_latest
mod_ssl-2.0.46-77.0.1.ent.i386.rpmed0ed17a8571c517467fea674bf23dd7f3f0e7a564f68831d16773f69330c92b-el3_u9_i386_patch
Oracle Linux 3 (x86_64) httpd-2.0.46-77.0.1.ent.src.rpm92b3720f523e985214268c750d00a03b3be7b430c7d0d17795985a0cf6a56a16-el3_u9_x86_64_patch
httpd-2.0.46-77.0.1.ent.src.rpm92b3720f523e985214268c750d00a03b3be7b430c7d0d17795985a0cf6a56a16-el3_x86_64_latest
httpd-2.0.46-77.0.1.ent.x86_64.rpme1af2071391a1aa89b949cdd9c1804ca789509837d78abcc27433246b46052c4-el3_u9_x86_64_patch
httpd-2.0.46-77.0.1.ent.x86_64.rpme1af2071391a1aa89b949cdd9c1804ca789509837d78abcc27433246b46052c4-el3_x86_64_latest
httpd-devel-2.0.46-77.0.1.ent.x86_64.rpm9a0409fbdffcad49c829af4c81a3aede7aeea71721e2e4b81eb1f8cd4fdad07b-el3_u9_x86_64_patch
httpd-devel-2.0.46-77.0.1.ent.x86_64.rpm9a0409fbdffcad49c829af4c81a3aede7aeea71721e2e4b81eb1f8cd4fdad07b-el3_x86_64_latest
mod_ssl-2.0.46-77.0.1.ent.x86_64.rpmdc8b0abc004ba4a8aeb824f91fe447abbf726831f49727e4f6b29376a140049e-el3_u9_x86_64_patch
mod_ssl-2.0.46-77.0.1.ent.x86_64.rpmdc8b0abc004ba4a8aeb824f91fe447abbf726831f49727e4f6b29376a140049e-el3_x86_64_latest
Oracle Linux 5 (i386) httpd-2.2.3-31.0.1.el5_4.2.src.rpm8c1359753e91e63f9fb8a3683b30438940606e23554d876463d824df08d9be36ELSA-2016-1421el5_u4_i386_patch
httpd-2.2.3-31.0.1.el5_4.2.i386.rpm20926c5e710706f666f3592d81438d4b898945aa824acb0d3d68365e03ef5e43ELSA-2016-1421el5_u4_i386_patch
httpd-devel-2.2.3-31.0.1.el5_4.2.i386.rpm5f1475c5e34d5b533d6322f63d7e08b0b922f864f9269cf0f9b694db5cc416b2ELSA-2016-1421el5_u4_i386_patch
httpd-manual-2.2.3-31.0.1.el5_4.2.i386.rpmc8c26e44c4b3df1f4b3016d8a96158a2c5fc2cce799f11c392234cf9c08f9f36ELSA-2016-1421el5_u4_i386_patch
mod_ssl-2.2.3-31.0.1.el5_4.2.i386.rpmc3f904a604a3658b331db34940078de3e97513dc07512f5526b354e2deae87f9ELSA-2016-1421el5_u4_i386_patch
Oracle Linux 5 (ia64) httpd-2.2.3-31.0.1.el5_4.2.src.rpm8c1359753e91e63f9fb8a3683b30438940606e23554d876463d824df08d9be36ELSA-2016-1421el5_u4_ia64_patch
httpd-2.2.3-31.0.1.el5_4.2.ia64.rpmb320dcb85ce10dd782492e540558416cca4f0db5971ab7275acda2e3d15bff4cELSA-2016-1421el5_u4_ia64_patch
httpd-devel-2.2.3-31.0.1.el5_4.2.ia64.rpm9cbf0f5d72a46ecb9df75f600d0a2e8d78a98c3743d42be3c2b96892e17e376eELSA-2016-1421el5_u4_ia64_patch
httpd-manual-2.2.3-31.0.1.el5_4.2.ia64.rpm30a2e5142c02035e7d3df31823a317be85a6cf167d79e4c5514a8fb03e77338fELSA-2016-1421el5_u4_ia64_patch
mod_ssl-2.2.3-31.0.1.el5_4.2.ia64.rpm9de26c3cc3707bb01876e34502e059f282a826327895519bab1f8cab6eba7485ELSA-2016-1421el5_u4_ia64_patch
Oracle Linux 5 (x86_64) httpd-2.2.3-31.0.1.el5_4.2.src.rpm8c1359753e91e63f9fb8a3683b30438940606e23554d876463d824df08d9be36ELSA-2016-1421el5_u4_x86_64_patch
httpd-2.2.3-31.0.1.el5_4.2.x86_64.rpmb61beeffc10ab51246b232ace1fecb8a9de299054c107dbd6e344ca10b428cecELSA-2016-1421el5_u4_x86_64_patch
httpd-devel-2.2.3-31.0.1.el5_4.2.i386.rpm5f1475c5e34d5b533d6322f63d7e08b0b922f864f9269cf0f9b694db5cc416b2ELSA-2016-1421el5_u4_x86_64_patch
httpd-devel-2.2.3-31.0.1.el5_4.2.x86_64.rpmd9a0636b82f964cc426204a67300c8e830b91574fdbe7da257f2d7c22dad5e20ELSA-2016-1421el5_u4_x86_64_patch
httpd-manual-2.2.3-31.0.1.el5_4.2.x86_64.rpm2204fadc92b349a39da6e0bf3292a1a68aede47664a665085dfd1ff1ca8ca3a8ELSA-2016-1421el5_u4_x86_64_patch
mod_ssl-2.2.3-31.0.1.el5_4.2.x86_64.rpm824df9213a4b033ab1f181ab539a30ddf425d0fcec445e0f14375df9bfea50f9ELSA-2016-1421el5_u4_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete