{"id":"RHSA-2013:0130","summary":"Red Hat Security Advisory: httpd security, bug fix, and enhancement update","modified":"2025-11-22T10:40:55Z","published":"2024-09-15T20:05:04Z","upstream":["CVE-2008-0455","CVE-2008-0456","CVE-2012-2687"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2013:0130"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#low"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=727342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=752618"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=767890"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=773473"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=783242"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=840845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=845532"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=850794"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=879292"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0130.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2008-0455"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2008-0455"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2008-0455"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2008-0456"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2008-0456"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2008-0456"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-2687"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-2687"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2687"}],"affected":[{"package":{"name":"httpd","ecosystem":"Red Hat:enterprise_linux:5::client_workstation","purl":"pkg:rpm/redhat/httpd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::client_workstation","purl":"pkg:rpm/redhat/httpd-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd-devel","ecosystem":"Red Hat:enterprise_linux:5::client_workstation","purl":"pkg:rpm/redhat/httpd-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd-manual","ecosystem":"Red Hat:enterprise_linux:5::client_workstation","purl":"pkg:rpm/redhat/httpd-manual"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"mod_ssl","ecosystem":"Red Hat:enterprise_linux:5::client_workstation","purl":"pkg:rpm/redhat/mod_ssl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/httpd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/httpd-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd-devel","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/httpd-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd-manual","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/httpd-manual"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"mod_ssl","ecosystem":"Red Hat:enterprise_linux:5::client","purl":"pkg:rpm/redhat/mod_ssl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/httpd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd-debuginfo","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/httpd-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd-devel","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/httpd-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"httpd-manual","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/httpd-manual"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}},{"package":{"name":"mod_ssl","ecosystem":"Red Hat:enterprise_linux:5::server","purl":"pkg:rpm/redhat/mod_ssl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.2.3-74.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0130.json"}}],"schema_version":"1.7.3"}