ELSA-2010-0659

ELSA-2010-0659 - httpd security and bug fix update

Type:SECURITY
Impact:MODERATE
Release Date:2010-08-30

Description



[2.2.3-43.0.1.el5_5.3 ]
- replace index.html with Oracle's index page oracle_index.html
- update vstring and distro in specfile

[2.2.3-43.3]
- mod_ssl: improved fix for SSLRequire's OID() function (#625452)

[2.2.3-43.2]
- add security fixes for CVE-2010-1452, CVE-2010-2791 (#623210)
- mod_deflate: rebase to 2.2.15 (#625435)
- stop multiple invocations of filter init functions (#625451)


Related CVEs


CVE-2010-1452
CVE-2010-2791

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) httpd-2.2.3-43.0.1.el5_5.3.src.rpmffde32a5aa67bc9461c541817e379dfd9f29c065cd8f0f0a266a8dd4b38f0b94ELSA-2016-1421el5_u5_i386_patch
httpd-2.2.3-43.0.1.el5_5.3.i386.rpmc877845f128bc022c1f82d4ca3d2fb656da4bf39520d174cc4c72b563a6665a3ELSA-2016-1421el5_u5_i386_patch
httpd-devel-2.2.3-43.0.1.el5_5.3.i386.rpmf1e5d89e5733592d5bc9ddb85472f12aefcc33495d6dd97d15c8b9dd8e78e003ELSA-2016-1421el5_u5_i386_patch
httpd-manual-2.2.3-43.0.1.el5_5.3.i386.rpmdebd56a2876bf254c80470d09bbc5c49d787433bbe787d667fb4a82f112418c5ELSA-2016-1421el5_u5_i386_patch
mod_ssl-2.2.3-43.0.1.el5_5.3.i386.rpm59cf3a46d2c5e17789ef8763cecc97a9a2b158e196dffb825ab2c77ce4a714e6ELSA-2016-1421el5_u5_i386_patch
Oracle Linux 5 (ia64) httpd-2.2.3-43.0.1.el5_5.3.src.rpmffde32a5aa67bc9461c541817e379dfd9f29c065cd8f0f0a266a8dd4b38f0b94ELSA-2016-1421el5_u5_ia64_patch
httpd-2.2.3-43.0.1.el5_5.3.src.rpmffde32a5aa67bc9461c541817e379dfd9f29c065cd8f0f0a266a8dd4b38f0b94ELSA-2016-1421ol5_ia64_latest
httpd-2.2.3-43.0.1.el5_5.3.ia64.rpmb0b20d876fa1e8c47b24473976bee990ac36377763ad9b885d891bb212a9b964ELSA-2016-1421el5_u5_ia64_patch
httpd-2.2.3-43.0.1.el5_5.3.ia64.rpmb0b20d876fa1e8c47b24473976bee990ac36377763ad9b885d891bb212a9b964ELSA-2016-1421ol5_ia64_latest
httpd-devel-2.2.3-43.0.1.el5_5.3.ia64.rpm168f75da8f85218d5617060faf09d5e41845f90e95099c463d2bc7058a5ed06aELSA-2016-1421el5_u5_ia64_patch
httpd-devel-2.2.3-43.0.1.el5_5.3.ia64.rpm168f75da8f85218d5617060faf09d5e41845f90e95099c463d2bc7058a5ed06aELSA-2016-1421ol5_ia64_latest
httpd-manual-2.2.3-43.0.1.el5_5.3.ia64.rpmd4a6bf7979a8efa689a1210a308d7c1c46e15a95ab6c9f9a9663fee917e214f9ELSA-2016-1421el5_u5_ia64_patch
httpd-manual-2.2.3-43.0.1.el5_5.3.ia64.rpmd4a6bf7979a8efa689a1210a308d7c1c46e15a95ab6c9f9a9663fee917e214f9ELSA-2016-1421ol5_ia64_latest
mod_ssl-2.2.3-43.0.1.el5_5.3.ia64.rpm0420ba8fcdcfbfa03f80a114761282e87e05c92be048fed525a18c83c2f37366ELSA-2016-1421el5_u5_ia64_patch
mod_ssl-2.2.3-43.0.1.el5_5.3.ia64.rpm0420ba8fcdcfbfa03f80a114761282e87e05c92be048fed525a18c83c2f37366ELSA-2016-1421ol5_ia64_latest
Oracle Linux 5 (x86_64) httpd-2.2.3-43.0.1.el5_5.3.src.rpmffde32a5aa67bc9461c541817e379dfd9f29c065cd8f0f0a266a8dd4b38f0b94ELSA-2016-1421el5_u5_x86_64_patch
httpd-2.2.3-43.0.1.el5_5.3.x86_64.rpmf91ea364ccf2ed93f9e5609781065f81e4679d59c48885479f2c3d0cb2975857ELSA-2016-1421el5_u5_x86_64_patch
httpd-devel-2.2.3-43.0.1.el5_5.3.i386.rpmf1e5d89e5733592d5bc9ddb85472f12aefcc33495d6dd97d15c8b9dd8e78e003ELSA-2016-1421el5_u5_x86_64_patch
httpd-devel-2.2.3-43.0.1.el5_5.3.x86_64.rpm3592e0d58f3424b30adcc91d884ce302dcff1f8e39227b0b4d7f64b2083bb395ELSA-2016-1421el5_u5_x86_64_patch
httpd-manual-2.2.3-43.0.1.el5_5.3.x86_64.rpm1e1658bff2c8df802585173fbd04c24baa72997e1157d00ed7c33facf2c9bc56ELSA-2016-1421el5_u5_x86_64_patch
mod_ssl-2.2.3-43.0.1.el5_5.3.x86_64.rpmc682ad9fa13fc2fc2c3ef1be7158de06e9b63ef076cc237e65e8de081633ccafELSA-2016-1421el5_u5_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete