ELSA-2013-0130

ELSA-2013-0130 - httpd security, bug fix, and enhancement update

Type:SECURITY
Impact:LOW
Release Date:2013-01-11

Description


[2.2.3-74.0.1.el5]
- fix mod_ssl always performing full renegotiation (Joe Jin) [orabug 12423387]
- replace index.html with Oracle's index page oracle_index.html
- update vstring and distro in specfile

[2.2.3-74]
- further %post scriptlet fix (#752618, #867736)

[2.2.3-73]
- fix %post scriptlet output (#752618, #867736)

[2.2.3-72]
- add security fix for CVE-2008-0456

[2.2.3-71]
- add security fix for CVE-2012-2687 (#850794)

[2.2.3-70]
- relax checks for status-line validity (#853128)

[2.2.3-69]
- mod_cache: fix header merging for 304 case, thanks to Roy Badami (#845532)
- correct CVE reference in old changelog entry (#849160)

[2.2.3-68]
- mod_ssl: add _userID DN variable suffix for NID_userId (#840036)
- fix handling of long chunk-line (#840845)
- omit %posttrans daemon restart if
/etc/sysconfig/httpd-disable-posttrans exists (#833042)

[2.2.3-67]
- add server aliases to 'httpd -S' output (#833043)
- LSB compliance fixes for init script (#783242)
- mod_ldap: add LDAPReferrals directive alias (#727342)

[2.2.3-66]
- check if localhost.key is valid (#752618)
- mod_proxy_ajp: honour ProxyErrorOverride (#767890)
- mod_ssl: fixed start with FIPS 140-2 mode enabled (#773473)


Related CVEs


CVE-2012-2687
CVE-2008-0455
CVE-2008-0456

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) httpd-2.2.3-74.0.1.el5.src.rpmfbd0796a913dd717b9f3f379969d4bbaa7326366e9f5a46ae4719f18d7810258ELSA-2016-1421ol5_i386_latest
httpd-2.2.3-74.0.1.el5.src.rpmfbd0796a913dd717b9f3f379969d4bbaa7326366e9f5a46ae4719f18d7810258ELSA-2016-1421ol5_u9_i386_base
httpd-2.2.3-74.0.1.el5.i386.rpm8ae826e775456c259adce5145e7a88569cfb4fc88f62ffe99237af97b7602f22ELSA-2016-1421ol5_i386_latest
httpd-2.2.3-74.0.1.el5.i386.rpm8ae826e775456c259adce5145e7a88569cfb4fc88f62ffe99237af97b7602f22ELSA-2016-1421ol5_u9_i386_base
httpd-devel-2.2.3-74.0.1.el5.i386.rpm1b9484463d7d102c98b703cc25f5006240af9f3ef5b3cd069fce0c42da30210eELSA-2016-1421ol5_i386_latest
httpd-devel-2.2.3-74.0.1.el5.i386.rpm1b9484463d7d102c98b703cc25f5006240af9f3ef5b3cd069fce0c42da30210eELSA-2016-1421ol5_u9_i386_base
httpd-manual-2.2.3-74.0.1.el5.i386.rpm674927945e961215fbaf5115b1fe4f80b4b31bbeac3660065baa007b54f9ef91ELSA-2016-1421ol5_i386_latest
httpd-manual-2.2.3-74.0.1.el5.i386.rpm674927945e961215fbaf5115b1fe4f80b4b31bbeac3660065baa007b54f9ef91ELSA-2016-1421ol5_u9_i386_base
mod_ssl-2.2.3-74.0.1.el5.i386.rpm450095cde277d9749b337c4d02b7bb6b6fdae08756797cf4cdea8be69d9d4b8aELSA-2016-1421ol5_i386_latest
mod_ssl-2.2.3-74.0.1.el5.i386.rpm450095cde277d9749b337c4d02b7bb6b6fdae08756797cf4cdea8be69d9d4b8aELSA-2016-1421ol5_u9_i386_base
Oracle Linux 5 (ia64) httpd-2.2.3-74.0.1.el5.src.rpmfbd0796a913dd717b9f3f379969d4bbaa7326366e9f5a46ae4719f18d7810258ELSA-2016-1421ol5_ia64_latest
httpd-2.2.3-74.0.1.el5.src.rpmfbd0796a913dd717b9f3f379969d4bbaa7326366e9f5a46ae4719f18d7810258ELSA-2016-1421ol5_u9_ia64_base
httpd-2.2.3-74.0.1.el5.ia64.rpme44ee0f3eb76f5bb8f7df957a416434c8d6c5ad782aecb360d7184e9509b9ebaELSA-2016-1421ol5_ia64_latest
httpd-2.2.3-74.0.1.el5.ia64.rpme44ee0f3eb76f5bb8f7df957a416434c8d6c5ad782aecb360d7184e9509b9ebaELSA-2016-1421ol5_u9_ia64_base
httpd-devel-2.2.3-74.0.1.el5.ia64.rpmcc26c3df442b3fbe5d3538a0ca2a392eacf4ac557dac8d387861c108aa0c1ffaELSA-2016-1421ol5_ia64_latest
httpd-devel-2.2.3-74.0.1.el5.ia64.rpmcc26c3df442b3fbe5d3538a0ca2a392eacf4ac557dac8d387861c108aa0c1ffaELSA-2016-1421ol5_u9_ia64_base
httpd-manual-2.2.3-74.0.1.el5.ia64.rpma810be2e6bc81c3d459739211380a8eaf35a8f1da3d5ab866c246714f70e72c2ELSA-2016-1421ol5_ia64_latest
httpd-manual-2.2.3-74.0.1.el5.ia64.rpma810be2e6bc81c3d459739211380a8eaf35a8f1da3d5ab866c246714f70e72c2ELSA-2016-1421ol5_u9_ia64_base
mod_ssl-2.2.3-74.0.1.el5.ia64.rpm1b390bae22fb49636ac7da1d66058db45bfdb8686f0b002b8e26dce677cf95deELSA-2016-1421ol5_ia64_latest
mod_ssl-2.2.3-74.0.1.el5.ia64.rpm1b390bae22fb49636ac7da1d66058db45bfdb8686f0b002b8e26dce677cf95deELSA-2016-1421ol5_u9_ia64_base
Oracle Linux 5 (x86_64) httpd-2.2.3-74.0.1.el5.src.rpmfbd0796a913dd717b9f3f379969d4bbaa7326366e9f5a46ae4719f18d7810258ELSA-2016-1421ol5_u9_x86_64_base
httpd-2.2.3-74.0.1.el5.src.rpmfbd0796a913dd717b9f3f379969d4bbaa7326366e9f5a46ae4719f18d7810258ELSA-2016-1421ol5_x86_64_latest
httpd-2.2.3-74.0.1.el5.x86_64.rpmaaa8c9ebb511f05670539434aa6c550c4f50b93fa8bf1efc60ca3f9dd523e8b8ELSA-2016-1421ol5_u9_x86_64_base
httpd-2.2.3-74.0.1.el5.x86_64.rpmaaa8c9ebb511f05670539434aa6c550c4f50b93fa8bf1efc60ca3f9dd523e8b8ELSA-2016-1421ol5_x86_64_latest
httpd-devel-2.2.3-74.0.1.el5.i386.rpm1b9484463d7d102c98b703cc25f5006240af9f3ef5b3cd069fce0c42da30210eELSA-2016-1421ol5_u9_x86_64_base
httpd-devel-2.2.3-74.0.1.el5.i386.rpm1b9484463d7d102c98b703cc25f5006240af9f3ef5b3cd069fce0c42da30210eELSA-2016-1421ol5_x86_64_latest
httpd-devel-2.2.3-74.0.1.el5.x86_64.rpmb504df4c29842ec490b4bfa48da37005e6d5d8fec5025bcb40897587061fd4bcELSA-2016-1421ol5_u9_x86_64_base
httpd-devel-2.2.3-74.0.1.el5.x86_64.rpmb504df4c29842ec490b4bfa48da37005e6d5d8fec5025bcb40897587061fd4bcELSA-2016-1421ol5_x86_64_latest
httpd-manual-2.2.3-74.0.1.el5.x86_64.rpma6ca486cecc6bb4f1f2b178f07a97f62c6784ca50bad5233755b69fb50ff65faELSA-2016-1421ol5_u9_x86_64_base
httpd-manual-2.2.3-74.0.1.el5.x86_64.rpma6ca486cecc6bb4f1f2b178f07a97f62c6784ca50bad5233755b69fb50ff65faELSA-2016-1421ol5_x86_64_latest
mod_ssl-2.2.3-74.0.1.el5.x86_64.rpmbb38580191c8204a7eb4b6d01d0e606c8f7c0bd72c2569a4ad3d422a3d6c6e1dELSA-2016-1421ol5_u9_x86_64_base
mod_ssl-2.2.3-74.0.1.el5.x86_64.rpmbb38580191c8204a7eb4b6d01d0e606c8f7c0bd72c2569a4ad3d422a3d6c6e1dELSA-2016-1421ol5_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete