Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:1380 - Bug Fix Advisory
Issued:
2009-09-02
Updated:
2009-09-02

RHBA-2009:1380 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

httpd bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd packages that fix various bugs are now available.

Description

The Apache HTTP Server is a popular and freely-available Web server.

These updated httpd packages provide fixes for the following bugs:

  • Apache's mod_mime_magic module attempts to determine the MIME type of

files using heuristic tests. However, the "magic" file used by the
mod_mime_magic module was unable to detect PNG images correctly as being of
MIME type "image/png", which this update corrects. (BZ#240844)

  • when using a reverse-proxy configuration with the mod_nss module being

used in place of the usual mod_ssl module, the mod_proxy module failed to
pass the hostname, which resulted in this error message: "Requested domain
name does not match the server's certificate". The hostname is now passed
correctly so that secure HTTP (https) connections no longer fail due to
this error. (BZ#479410)

  • the "mod_ssl" module placed a hard-coded 128K limit on the amount of

request body data which would be buffered if an SSL renegotiation was
required in a Location or Directory context. This could occur if a POST
request was made to a Directory or Location which required client
certificate authentication. The limit on the amount of data to buffer is
now configurable using the "SSLRenegBufferSize" directive. (BZ#479806)

  • when configuring a reverse proxy using an .htaccess file (instead of

httpd.conf) by using a "RewriteRule" to proxy requests using the "[P]"
flag, space characters in URIs would not be correctly escaped in remote
server requests, resulting in "404 Not Found" response codes. This has been
fixed so that .htaccess-configured reverse proxies perform proper
character-escaping. (BZ#480604)

  • if an error occurred when invoking a CGI script, the "500 Internal Server

Error" error document was not generated. (BZ#480932)

  • the mod_speling module attempts to correct misspellings of URLs. When the

"AcceptPathInfo" directive was not enabled, then mod_speling did not handle
and correct misspelled directory names. This has been fixed so that
directory names are always handled, and possibly corrected, by the
mod_speling module, regardless of the value that "AcceptPathInfo" is set
to. (BZ#485524)

  • if request body data was buffered when an SSL renegotiation was required

in a Location or Directory context, then the buffered data was discarded if
an internal redirect occurred. (BZ#488886)

  • the httpd init script did not reference the process ID stored by a

running daemon, and invocations could affect other httpd processes running
on the system. (BZ#491135)

  • during a graceful restart, a spurious "Bad file descriptor" error message

was sometimes logged. The error, though harmless, occurred because the
socket on which the server called the accept() function was immediately
closed in child processes upon receipt of the graceful restart signal. This
error message is no longer logged. (BZ#233955)

  • during a graceful restart, the following spurious error messages were

logged by the mod_rewrite module if the "RewriteLog" directive was
configured: "apr_global_mutex_lock(rewrite_log_lock) failed". (BZ#493023)

  • Apache's mod_ext_filter module sometimes logged this spurious error

message if an input filter was configured and an error response was sent:
"Bad file descriptor: apr_file_close(child input)". (BZ#479463)

  • the "%p" format option in the "CustomLog" directive, used to log a port

number in a request, did not respect the "remote" and "local" specifiers.
(BZ#493070)

  • the httpd package inappropriately obsoleted the "mod_jk" package; it no

longer does so. (BZ#493592)

  • an invalid HTTP status code--such as 70007--was logged to the access log if

a timeout or other input error occurred while reading the request body
during processing of a CGI script. (BZ#498170)

  • a security issue fix (CVE-2009-1195) in Server-Side Include (SSI)

Options-handling inadvertently broke backwards-compatibility with the
mod_perl module. (BZ#502998)

Users are advised to upgrade to these updated packages, which resolve these
issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 233955 - Bad file descriptor: apr_socket_accept
  • BZ - 240844 - /etc/httpd/conf/magic is too simple (PNG is missing)
  • BZ - 479463 - Bad file descriptor: apr_file_close(child input)
  • BZ - 479806 - Can't do POST larger than 128K to ssl sites
  • BZ - 480932 - mod_cgi: error pages have wrong headers
  • BZ - 485524 - mod_speling not correcting directory names in a URI
  • BZ - 488886 - mod_rewrite+mod_ssl+SSLVerifyClient = no POST variables
  • BZ - 491135 - Fix /etc/init.d/httpd to use the pid file of the server to restart instead of blowing all httpds away
  • BZ - 491763 - HTTPS+SSLVerifyClient require in <Directory>+big POST = Apache error
  • BZ - 493023 - mod_rewrite: apr_global_mutex_lock(rewrite_log_lock) failed
  • BZ - 493070 - mod_log_config: format options for %p (locale, remote) broken
  • BZ - 493592 - The httpd package shouldn't obsolete mod_jk
  • BZ - 498170 - httpd incorrectly returns lower level return code (70007 status code is not RFC)
  • BZ - 502998 - Backwards compatibility for CVE-2009-1195 change

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
httpd-2.2.3-31.el5.src.rpm SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2
x86_64
httpd-2.2.3-31.el5.x86_64.rpm SHA-256: af6a136e9c5a2f5243a8c3211f1b72a7770dd1487ab05de21b43ef9616c85d22
httpd-devel-2.2.3-31.el5.i386.rpm SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c
httpd-devel-2.2.3-31.el5.x86_64.rpm SHA-256: d199180e321978ec7ae4951259416793e3cec6f1619c67f76aa35d50abfbd2e0
httpd-manual-2.2.3-31.el5.x86_64.rpm SHA-256: 1cd8be9372048c7d4fca00f31ddb6964bbca14a9f9ac3a28ee2a66d06917458c
mod_ssl-2.2.3-31.el5.x86_64.rpm SHA-256: 06f7c4342c34aa63fce48b7adff4cdadacd15c0c0cf47a7b8fcffa671118707a
ia64
httpd-2.2.3-31.el5.ia64.rpm SHA-256: e48b25b8da95e72571d1b1a064a05168e9ad2858da4e92b3296d449696443a12
httpd-devel-2.2.3-31.el5.ia64.rpm SHA-256: 2cd785eafc65e99684488c0e8ffc48837a6986da1f4fa49bca93508758279c6a
httpd-manual-2.2.3-31.el5.ia64.rpm SHA-256: 8630487a111c30163490642d63605bf7a8272c75acc814728f5b163d19311ecf
mod_ssl-2.2.3-31.el5.ia64.rpm SHA-256: 3e4d53341ec00dc75e38703dbbf460530912e471d7d6b14c88fa0fca86ffdfae
i386
httpd-2.2.3-31.el5.i386.rpm SHA-256: 4dfca7fade4b8179709d03b4fd0d58f85aedb654bf7847ffc179c46985edad1a
httpd-devel-2.2.3-31.el5.i386.rpm SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c
httpd-manual-2.2.3-31.el5.i386.rpm SHA-256: 2c386444c92c99ea5e98886f371d149e0a70cfed401eb189b0ec50a7338f92ba
mod_ssl-2.2.3-31.el5.i386.rpm SHA-256: f372effce51a477e71f8f409b07abe006dfc153cf863ff1aef0eea5a9e18f57f

Red Hat Enterprise Linux Workstation 5

SRPM
httpd-2.2.3-31.el5.src.rpm SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2
x86_64
httpd-2.2.3-31.el5.x86_64.rpm SHA-256: af6a136e9c5a2f5243a8c3211f1b72a7770dd1487ab05de21b43ef9616c85d22
httpd-devel-2.2.3-31.el5.i386.rpm SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c
httpd-devel-2.2.3-31.el5.x86_64.rpm SHA-256: d199180e321978ec7ae4951259416793e3cec6f1619c67f76aa35d50abfbd2e0
httpd-manual-2.2.3-31.el5.x86_64.rpm SHA-256: 1cd8be9372048c7d4fca00f31ddb6964bbca14a9f9ac3a28ee2a66d06917458c
mod_ssl-2.2.3-31.el5.x86_64.rpm SHA-256: 06f7c4342c34aa63fce48b7adff4cdadacd15c0c0cf47a7b8fcffa671118707a
i386
httpd-2.2.3-31.el5.i386.rpm SHA-256: 4dfca7fade4b8179709d03b4fd0d58f85aedb654bf7847ffc179c46985edad1a
httpd-devel-2.2.3-31.el5.i386.rpm SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c
httpd-manual-2.2.3-31.el5.i386.rpm SHA-256: 2c386444c92c99ea5e98886f371d149e0a70cfed401eb189b0ec50a7338f92ba
mod_ssl-2.2.3-31.el5.i386.rpm SHA-256: f372effce51a477e71f8f409b07abe006dfc153cf863ff1aef0eea5a9e18f57f

Red Hat Enterprise Linux Desktop 5

SRPM
httpd-2.2.3-31.el5.src.rpm SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2
x86_64
httpd-2.2.3-31.el5.x86_64.rpm SHA-256: af6a136e9c5a2f5243a8c3211f1b72a7770dd1487ab05de21b43ef9616c85d22
mod_ssl-2.2.3-31.el5.x86_64.rpm SHA-256: 06f7c4342c34aa63fce48b7adff4cdadacd15c0c0cf47a7b8fcffa671118707a
i386
httpd-2.2.3-31.el5.i386.rpm SHA-256: 4dfca7fade4b8179709d03b4fd0d58f85aedb654bf7847ffc179c46985edad1a
mod_ssl-2.2.3-31.el5.i386.rpm SHA-256: f372effce51a477e71f8f409b07abe006dfc153cf863ff1aef0eea5a9e18f57f

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
httpd-2.2.3-31.el5.src.rpm SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2
s390x
httpd-2.2.3-31.el5.s390x.rpm SHA-256: a3165a1ab910ddebdec97705e629339c6a7d96b8ec8e661e567de8be67e1e1d7
httpd-devel-2.2.3-31.el5.s390.rpm SHA-256: fa3e64824f9aab4866080b0067196357f51598a77e99166d55b990fcb3c1c101
httpd-devel-2.2.3-31.el5.s390x.rpm SHA-256: ad2cbce0dcb413e10eb23fc7c566d0ab65e392719775dfe9f304707f47988bb1
httpd-manual-2.2.3-31.el5.s390x.rpm SHA-256: 1c8997b75ae33c7620592821042473e1a099af7470daa7461f8551e58dabffbc
mod_ssl-2.2.3-31.el5.s390x.rpm SHA-256: 030e8c5f79c06854d36bdb8b7fbf6c12f49dc92ce96e1877bee917c6495489ad

Red Hat Enterprise Linux for Power, big endian 5

SRPM
httpd-2.2.3-31.el5.src.rpm SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2
ppc
httpd-2.2.3-31.el5.ppc.rpm SHA-256: 1ca06fca78863e86d7e04d866a61d98baad1f4e0b241a4523b9466b112a35d5b
httpd-devel-2.2.3-31.el5.ppc.rpm SHA-256: 33604dd10670b5b960f2b326b2b5ef180ea5a8215ca74e6e6d4bce4b2fe3e18c
httpd-devel-2.2.3-31.el5.ppc64.rpm SHA-256: a48f85f43abc2d01f7b651ab6de64d56e743b137ff0a3717b014ca84bd9472f5
httpd-manual-2.2.3-31.el5.ppc.rpm SHA-256: 6e9d58a835b9fa679c317a33fbbb466b9ab7b338223a97e3c2b54e9e70676d97
mod_ssl-2.2.3-31.el5.ppc.rpm SHA-256: ddb5cbfa83493edf9062cb929bd7502fd0ccb10e57124fe3ab0f8e5607d1dbd9

Red Hat Enterprise Linux Server from RHUI 5

SRPM
httpd-2.2.3-31.el5.src.rpm SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2
x86_64
httpd-2.2.3-31.el5.x86_64.rpm SHA-256: af6a136e9c5a2f5243a8c3211f1b72a7770dd1487ab05de21b43ef9616c85d22
httpd-devel-2.2.3-31.el5.i386.rpm SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c
httpd-devel-2.2.3-31.el5.x86_64.rpm SHA-256: d199180e321978ec7ae4951259416793e3cec6f1619c67f76aa35d50abfbd2e0
httpd-manual-2.2.3-31.el5.x86_64.rpm SHA-256: 1cd8be9372048c7d4fca00f31ddb6964bbca14a9f9ac3a28ee2a66d06917458c
mod_ssl-2.2.3-31.el5.x86_64.rpm SHA-256: 06f7c4342c34aa63fce48b7adff4cdadacd15c0c0cf47a7b8fcffa671118707a
i386
httpd-2.2.3-31.el5.i386.rpm SHA-256: 4dfca7fade4b8179709d03b4fd0d58f85aedb654bf7847ffc179c46985edad1a
httpd-devel-2.2.3-31.el5.i386.rpm SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c
httpd-manual-2.2.3-31.el5.i386.rpm SHA-256: 2c386444c92c99ea5e98886f371d149e0a70cfed401eb189b0ec50a7338f92ba
mod_ssl-2.2.3-31.el5.i386.rpm SHA-256: f372effce51a477e71f8f409b07abe006dfc153cf863ff1aef0eea5a9e18f57f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility