- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1380 - Bug Fix Advisory
Synopsis
httpd bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated httpd packages that fix various bugs are now available.
Description
The Apache HTTP Server is a popular and freely-available Web server.
These updated httpd packages provide fixes for the following bugs:
- Apache's mod_mime_magic module attempts to determine the MIME type of
files using heuristic tests. However, the "magic" file used by the
mod_mime_magic module was unable to detect PNG images correctly as being of
MIME type "image/png", which this update corrects. (BZ#240844)
- when using a reverse-proxy configuration with the mod_nss module being
used in place of the usual mod_ssl module, the mod_proxy module failed to
pass the hostname, which resulted in this error message: "Requested domain
name does not match the server's certificate". The hostname is now passed
correctly so that secure HTTP (https) connections no longer fail due to
this error. (BZ#479410)
- the "mod_ssl" module placed a hard-coded 128K limit on the amount of
request body data which would be buffered if an SSL renegotiation was
required in a Location or Directory context. This could occur if a POST
request was made to a Directory or Location which required client
certificate authentication. The limit on the amount of data to buffer is
now configurable using the "SSLRenegBufferSize" directive. (BZ#479806)
- when configuring a reverse proxy using an .htaccess file (instead of
httpd.conf) by using a "RewriteRule" to proxy requests using the "[P]"
flag, space characters in URIs would not be correctly escaped in remote
server requests, resulting in "404 Not Found" response codes. This has been
fixed so that .htaccess-configured reverse proxies perform proper
character-escaping. (BZ#480604)
- if an error occurred when invoking a CGI script, the "500 Internal Server
Error" error document was not generated. (BZ#480932)
- the mod_speling module attempts to correct misspellings of URLs. When the
"AcceptPathInfo" directive was not enabled, then mod_speling did not handle
and correct misspelled directory names. This has been fixed so that
directory names are always handled, and possibly corrected, by the
mod_speling module, regardless of the value that "AcceptPathInfo" is set
to. (BZ#485524)
- if request body data was buffered when an SSL renegotiation was required
in a Location or Directory context, then the buffered data was discarded if
an internal redirect occurred. (BZ#488886)
- the httpd init script did not reference the process ID stored by a
running daemon, and invocations could affect other httpd processes running
on the system. (BZ#491135)
- during a graceful restart, a spurious "Bad file descriptor" error message
was sometimes logged. The error, though harmless, occurred because the
socket on which the server called the accept() function was immediately
closed in child processes upon receipt of the graceful restart signal. This
error message is no longer logged. (BZ#233955)
- during a graceful restart, the following spurious error messages were
logged by the mod_rewrite module if the "RewriteLog" directive was
configured: "apr_global_mutex_lock(rewrite_log_lock) failed". (BZ#493023)
- Apache's mod_ext_filter module sometimes logged this spurious error
message if an input filter was configured and an error response was sent:
"Bad file descriptor: apr_file_close(child input)". (BZ#479463)
- the "%p" format option in the "CustomLog" directive, used to log a port
number in a request, did not respect the "remote" and "local" specifiers.
(BZ#493070)
- the httpd package inappropriately obsoleted the "mod_jk" package; it no
longer does so. (BZ#493592)
- an invalid HTTP status code--such as 70007--was logged to the access log if
a timeout or other input error occurred while reading the request body
during processing of a CGI script. (BZ#498170)
- a security issue fix (CVE-2009-1195) in Server-Side Include (SSI)
Options-handling inadvertently broke backwards-compatibility with the
mod_perl module. (BZ#502998)
Users are advised to upgrade to these updated packages, which resolve these
issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 233955 - Bad file descriptor: apr_socket_accept
- BZ - 240844 - /etc/httpd/conf/magic is too simple (PNG is missing)
- BZ - 479463 - Bad file descriptor: apr_file_close(child input)
- BZ - 479806 - Can't do POST larger than 128K to ssl sites
- BZ - 480932 - mod_cgi: error pages have wrong headers
- BZ - 485524 - mod_speling not correcting directory names in a URI
- BZ - 488886 - mod_rewrite+mod_ssl+SSLVerifyClient = no POST variables
- BZ - 491135 - Fix /etc/init.d/httpd to use the pid file of the server to restart instead of blowing all httpds away
- BZ - 491763 - HTTPS+SSLVerifyClient require in <Directory>+big POST = Apache error
- BZ - 493023 - mod_rewrite: apr_global_mutex_lock(rewrite_log_lock) failed
- BZ - 493070 - mod_log_config: format options for %p (locale, remote) broken
- BZ - 493592 - The httpd package shouldn't obsolete mod_jk
- BZ - 498170 - httpd incorrectly returns lower level return code (70007 status code is not RFC)
- BZ - 502998 - Backwards compatibility for CVE-2009-1195 change
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
httpd-2.2.3-31.el5.src.rpm | SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2 |
x86_64 | |
httpd-2.2.3-31.el5.x86_64.rpm | SHA-256: af6a136e9c5a2f5243a8c3211f1b72a7770dd1487ab05de21b43ef9616c85d22 |
httpd-devel-2.2.3-31.el5.i386.rpm | SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c |
httpd-devel-2.2.3-31.el5.x86_64.rpm | SHA-256: d199180e321978ec7ae4951259416793e3cec6f1619c67f76aa35d50abfbd2e0 |
httpd-manual-2.2.3-31.el5.x86_64.rpm | SHA-256: 1cd8be9372048c7d4fca00f31ddb6964bbca14a9f9ac3a28ee2a66d06917458c |
mod_ssl-2.2.3-31.el5.x86_64.rpm | SHA-256: 06f7c4342c34aa63fce48b7adff4cdadacd15c0c0cf47a7b8fcffa671118707a |
ia64 | |
httpd-2.2.3-31.el5.ia64.rpm | SHA-256: e48b25b8da95e72571d1b1a064a05168e9ad2858da4e92b3296d449696443a12 |
httpd-devel-2.2.3-31.el5.ia64.rpm | SHA-256: 2cd785eafc65e99684488c0e8ffc48837a6986da1f4fa49bca93508758279c6a |
httpd-manual-2.2.3-31.el5.ia64.rpm | SHA-256: 8630487a111c30163490642d63605bf7a8272c75acc814728f5b163d19311ecf |
mod_ssl-2.2.3-31.el5.ia64.rpm | SHA-256: 3e4d53341ec00dc75e38703dbbf460530912e471d7d6b14c88fa0fca86ffdfae |
i386 | |
httpd-2.2.3-31.el5.i386.rpm | SHA-256: 4dfca7fade4b8179709d03b4fd0d58f85aedb654bf7847ffc179c46985edad1a |
httpd-devel-2.2.3-31.el5.i386.rpm | SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c |
httpd-manual-2.2.3-31.el5.i386.rpm | SHA-256: 2c386444c92c99ea5e98886f371d149e0a70cfed401eb189b0ec50a7338f92ba |
mod_ssl-2.2.3-31.el5.i386.rpm | SHA-256: f372effce51a477e71f8f409b07abe006dfc153cf863ff1aef0eea5a9e18f57f |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
httpd-2.2.3-31.el5.src.rpm | SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2 |
x86_64 | |
httpd-2.2.3-31.el5.x86_64.rpm | SHA-256: af6a136e9c5a2f5243a8c3211f1b72a7770dd1487ab05de21b43ef9616c85d22 |
httpd-devel-2.2.3-31.el5.i386.rpm | SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c |
httpd-devel-2.2.3-31.el5.x86_64.rpm | SHA-256: d199180e321978ec7ae4951259416793e3cec6f1619c67f76aa35d50abfbd2e0 |
httpd-manual-2.2.3-31.el5.x86_64.rpm | SHA-256: 1cd8be9372048c7d4fca00f31ddb6964bbca14a9f9ac3a28ee2a66d06917458c |
mod_ssl-2.2.3-31.el5.x86_64.rpm | SHA-256: 06f7c4342c34aa63fce48b7adff4cdadacd15c0c0cf47a7b8fcffa671118707a |
i386 | |
httpd-2.2.3-31.el5.i386.rpm | SHA-256: 4dfca7fade4b8179709d03b4fd0d58f85aedb654bf7847ffc179c46985edad1a |
httpd-devel-2.2.3-31.el5.i386.rpm | SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c |
httpd-manual-2.2.3-31.el5.i386.rpm | SHA-256: 2c386444c92c99ea5e98886f371d149e0a70cfed401eb189b0ec50a7338f92ba |
mod_ssl-2.2.3-31.el5.i386.rpm | SHA-256: f372effce51a477e71f8f409b07abe006dfc153cf863ff1aef0eea5a9e18f57f |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
httpd-2.2.3-31.el5.src.rpm | SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2 |
x86_64 | |
httpd-2.2.3-31.el5.x86_64.rpm | SHA-256: af6a136e9c5a2f5243a8c3211f1b72a7770dd1487ab05de21b43ef9616c85d22 |
mod_ssl-2.2.3-31.el5.x86_64.rpm | SHA-256: 06f7c4342c34aa63fce48b7adff4cdadacd15c0c0cf47a7b8fcffa671118707a |
i386 | |
httpd-2.2.3-31.el5.i386.rpm | SHA-256: 4dfca7fade4b8179709d03b4fd0d58f85aedb654bf7847ffc179c46985edad1a |
mod_ssl-2.2.3-31.el5.i386.rpm | SHA-256: f372effce51a477e71f8f409b07abe006dfc153cf863ff1aef0eea5a9e18f57f |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
httpd-2.2.3-31.el5.src.rpm | SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2 |
s390x | |
httpd-2.2.3-31.el5.s390x.rpm | SHA-256: a3165a1ab910ddebdec97705e629339c6a7d96b8ec8e661e567de8be67e1e1d7 |
httpd-devel-2.2.3-31.el5.s390.rpm | SHA-256: fa3e64824f9aab4866080b0067196357f51598a77e99166d55b990fcb3c1c101 |
httpd-devel-2.2.3-31.el5.s390x.rpm | SHA-256: ad2cbce0dcb413e10eb23fc7c566d0ab65e392719775dfe9f304707f47988bb1 |
httpd-manual-2.2.3-31.el5.s390x.rpm | SHA-256: 1c8997b75ae33c7620592821042473e1a099af7470daa7461f8551e58dabffbc |
mod_ssl-2.2.3-31.el5.s390x.rpm | SHA-256: 030e8c5f79c06854d36bdb8b7fbf6c12f49dc92ce96e1877bee917c6495489ad |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
httpd-2.2.3-31.el5.src.rpm | SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2 |
ppc | |
httpd-2.2.3-31.el5.ppc.rpm | SHA-256: 1ca06fca78863e86d7e04d866a61d98baad1f4e0b241a4523b9466b112a35d5b |
httpd-devel-2.2.3-31.el5.ppc.rpm | SHA-256: 33604dd10670b5b960f2b326b2b5ef180ea5a8215ca74e6e6d4bce4b2fe3e18c |
httpd-devel-2.2.3-31.el5.ppc64.rpm | SHA-256: a48f85f43abc2d01f7b651ab6de64d56e743b137ff0a3717b014ca84bd9472f5 |
httpd-manual-2.2.3-31.el5.ppc.rpm | SHA-256: 6e9d58a835b9fa679c317a33fbbb466b9ab7b338223a97e3c2b54e9e70676d97 |
mod_ssl-2.2.3-31.el5.ppc.rpm | SHA-256: ddb5cbfa83493edf9062cb929bd7502fd0ccb10e57124fe3ab0f8e5607d1dbd9 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
httpd-2.2.3-31.el5.src.rpm | SHA-256: efed2cfd2f640eb85e24cc73f5743be9fe65010d8b647005e9704f0c8623f6e2 |
x86_64 | |
httpd-2.2.3-31.el5.x86_64.rpm | SHA-256: af6a136e9c5a2f5243a8c3211f1b72a7770dd1487ab05de21b43ef9616c85d22 |
httpd-devel-2.2.3-31.el5.i386.rpm | SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c |
httpd-devel-2.2.3-31.el5.x86_64.rpm | SHA-256: d199180e321978ec7ae4951259416793e3cec6f1619c67f76aa35d50abfbd2e0 |
httpd-manual-2.2.3-31.el5.x86_64.rpm | SHA-256: 1cd8be9372048c7d4fca00f31ddb6964bbca14a9f9ac3a28ee2a66d06917458c |
mod_ssl-2.2.3-31.el5.x86_64.rpm | SHA-256: 06f7c4342c34aa63fce48b7adff4cdadacd15c0c0cf47a7b8fcffa671118707a |
i386 | |
httpd-2.2.3-31.el5.i386.rpm | SHA-256: 4dfca7fade4b8179709d03b4fd0d58f85aedb654bf7847ffc179c46985edad1a |
httpd-devel-2.2.3-31.el5.i386.rpm | SHA-256: 5ea141a30d8eebb689cb84363b0c8869eedb024beda6293cb6edbcd028ff840c |
httpd-manual-2.2.3-31.el5.i386.rpm | SHA-256: 2c386444c92c99ea5e98886f371d149e0a70cfed401eb189b0ec50a7338f92ba |
mod_ssl-2.2.3-31.el5.i386.rpm | SHA-256: f372effce51a477e71f8f409b07abe006dfc153cf863ff1aef0eea5a9e18f57f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.