- Issued:
- 2011-07-21
- Updated:
- 2011-07-21
RHBA-2011:1067 - Bug Fix Advisory
Synopsis
httpd bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated httpd packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 5.
Description
The Apache HTTP Server is a popular web server.
These updated httpd packages include a number of bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Refer to the
Red Hat Enterprise Linux 5.7 Technical Notes for information about these
changes:
All users of httpd are advised to upgrade to these updated packages, which
provide numerous bug fixes and enhancements.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 264681 - mod_ldap stops caching with per-vhost directive use
- BZ - 379811 - Apache CacheMaxExpire directive ignored (upstream reported bug with patch)
- BZ - 552303 - SEGV due to corrupt bucket brigades when using mod_proxy
- BZ - 580008 - httpd crash after premature connection termination
- BZ - 604727 - mod_authnz_ldap Apache module fails when 'refer' entries returned from LDAP
- BZ - 612198 - RFE: add mod_reqtimeout to mitigate against slowloris attack
- BZ - 632407 - proxy: error reading status line from remote server
- BZ - 636427 - mod_ssl possible memory corruption
- BZ - 649648 - mod_ssl: startup fails with duplicate SSL vhost configurations
- BZ - 673276 - mod_headers "edit" replaces multiple headers with the first match
- BZ - 674102 - prefork children in keepalive do not exit on graceful
- BZ - 678057 - ProxyPassReverse breaks with balancer:// URLs (upstream #45434)
- BZ - 679994 - mod_filter cannot match against response headers from CGI script
- BZ - 691497 - mod_proxy with SSLProxyEngine truncates files fetched with chunked encoding Summary
- BZ - 696488 - Cannot load /etc/httpd/modules/mod_proxy.so into server: /etc/httpd/modules/mod_proxy.so: undefined symbol: ap_get_server_banner
CVEs
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
httpd-2.2.3-53.el5.src.rpm | SHA-256: af5f78f383ba38d7692b8662edfc3404d8282e53feea9441e6b59f71368152a0 |
x86_64 | |
httpd-2.2.3-53.el5.x86_64.rpm | SHA-256: aacdec674e841e8b801fc6d0b189a13b3e8ccfa754c8d8e73917684a3b8d29f1 |
httpd-devel-2.2.3-53.el5.i386.rpm | SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6 |
httpd-devel-2.2.3-53.el5.x86_64.rpm | SHA-256: e2081edb7e1b28604c321e759ce72bb418da015b0bc10ca7ddd0be1c83d40d46 |
httpd-manual-2.2.3-53.el5.x86_64.rpm | SHA-256: 66cc0aae3b1b67f038ad2801fe7ca263a076f1c87d4f8eeb96d4a3ef2cc4fd8e |
mod_ssl-2.2.3-53.el5.x86_64.rpm | SHA-256: 550aee2aa49b129041ebb85ecac4dc0511c74531f3d22cfb7454751269f8fdbb |
ia64 | |
httpd-2.2.3-53.el5.ia64.rpm | SHA-256: a09d891aa6f51e18fccbf04a604c488976c214bc8ca985a1cd6426dd4973e1c5 |
httpd-devel-2.2.3-53.el5.ia64.rpm | SHA-256: bfc5b346c26dbfb1151d7aaa06bae4f712d3c80335c6cc23f91932625647f29d |
httpd-manual-2.2.3-53.el5.ia64.rpm | SHA-256: b1b7f0973e2525a4afe0a37760c953ebd5ab9d84a5279dc5b1b0c2a1c3c7e63f |
mod_ssl-2.2.3-53.el5.ia64.rpm | SHA-256: 4556d1d9d245028d508ff0cf9dacddd1ab61109d44e585ba38077c3245177a28 |
i386 | |
httpd-2.2.3-53.el5.i386.rpm | SHA-256: 532c3db8bfca8afef9951cf21901adeb31eaef5ee58c3b5a9ce44a0e6ae6119c |
httpd-devel-2.2.3-53.el5.i386.rpm | SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6 |
httpd-manual-2.2.3-53.el5.i386.rpm | SHA-256: 28cfe0c5e86df0d9a9c3b630a97b631f6ac87ca2eaf87b5bbde9147bd6167b23 |
mod_ssl-2.2.3-53.el5.i386.rpm | SHA-256: 7cd6dc1280be416895825ed3627657281f74c0cfd03a6479f813b54979a701a5 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
httpd-2.2.3-53.el5.src.rpm | SHA-256: af5f78f383ba38d7692b8662edfc3404d8282e53feea9441e6b59f71368152a0 |
x86_64 | |
httpd-2.2.3-53.el5.x86_64.rpm | SHA-256: aacdec674e841e8b801fc6d0b189a13b3e8ccfa754c8d8e73917684a3b8d29f1 |
httpd-devel-2.2.3-53.el5.i386.rpm | SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6 |
httpd-devel-2.2.3-53.el5.x86_64.rpm | SHA-256: e2081edb7e1b28604c321e759ce72bb418da015b0bc10ca7ddd0be1c83d40d46 |
httpd-manual-2.2.3-53.el5.x86_64.rpm | SHA-256: 66cc0aae3b1b67f038ad2801fe7ca263a076f1c87d4f8eeb96d4a3ef2cc4fd8e |
mod_ssl-2.2.3-53.el5.x86_64.rpm | SHA-256: 550aee2aa49b129041ebb85ecac4dc0511c74531f3d22cfb7454751269f8fdbb |
i386 | |
httpd-2.2.3-53.el5.i386.rpm | SHA-256: 532c3db8bfca8afef9951cf21901adeb31eaef5ee58c3b5a9ce44a0e6ae6119c |
httpd-devel-2.2.3-53.el5.i386.rpm | SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6 |
httpd-manual-2.2.3-53.el5.i386.rpm | SHA-256: 28cfe0c5e86df0d9a9c3b630a97b631f6ac87ca2eaf87b5bbde9147bd6167b23 |
mod_ssl-2.2.3-53.el5.i386.rpm | SHA-256: 7cd6dc1280be416895825ed3627657281f74c0cfd03a6479f813b54979a701a5 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
httpd-2.2.3-53.el5.src.rpm | SHA-256: af5f78f383ba38d7692b8662edfc3404d8282e53feea9441e6b59f71368152a0 |
x86_64 | |
httpd-2.2.3-53.el5.x86_64.rpm | SHA-256: aacdec674e841e8b801fc6d0b189a13b3e8ccfa754c8d8e73917684a3b8d29f1 |
mod_ssl-2.2.3-53.el5.x86_64.rpm | SHA-256: 550aee2aa49b129041ebb85ecac4dc0511c74531f3d22cfb7454751269f8fdbb |
i386 | |
httpd-2.2.3-53.el5.i386.rpm | SHA-256: 532c3db8bfca8afef9951cf21901adeb31eaef5ee58c3b5a9ce44a0e6ae6119c |
mod_ssl-2.2.3-53.el5.i386.rpm | SHA-256: 7cd6dc1280be416895825ed3627657281f74c0cfd03a6479f813b54979a701a5 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
httpd-2.2.3-53.el5.src.rpm | SHA-256: af5f78f383ba38d7692b8662edfc3404d8282e53feea9441e6b59f71368152a0 |
s390x | |
httpd-2.2.3-53.el5.s390x.rpm | SHA-256: a45ad5a2022dfbc3e4c81f20a82ff8d88f508d965de9841ea199732c752a23aa |
httpd-devel-2.2.3-53.el5.s390.rpm | SHA-256: a8a1e52b1f04977c890eea336aa35a8cc910e937a6217db94038f9d7193fb387 |
httpd-devel-2.2.3-53.el5.s390x.rpm | SHA-256: b70fe0e6bcbc3d4cff380ca888eba53324c9cac8ab2e3c2096d967d856302afe |
httpd-manual-2.2.3-53.el5.s390x.rpm | SHA-256: 43ddc844a1de5df2df69d958900a841e1e11095c3201a1b03d33bdda8635b2ba |
mod_ssl-2.2.3-53.el5.s390x.rpm | SHA-256: 8155f13e3352c3fe492234e71b970d7d1597ea06593cddc3726c1406ef722755 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
httpd-2.2.3-53.el5.src.rpm | SHA-256: af5f78f383ba38d7692b8662edfc3404d8282e53feea9441e6b59f71368152a0 |
ppc | |
httpd-2.2.3-53.el5.ppc.rpm | SHA-256: 27647fa45519cc9c3f26c16c9905613b54f915023e74577ddba0cedc0fc5a2b3 |
httpd-devel-2.2.3-53.el5.ppc.rpm | SHA-256: c41cb88af9d57419ca9a92054d9f76f4a4bfd78389893be01f940d9699f98e75 |
httpd-devel-2.2.3-53.el5.ppc64.rpm | SHA-256: f7630b627f170bd87c2687d15cb57ca06f795ec91ff0a0551ba71fe531658673 |
httpd-manual-2.2.3-53.el5.ppc.rpm | SHA-256: c59615241340ebff5466a0b915438b9ed65efab7a54d8be6e7f87bf77d15e4e2 |
mod_ssl-2.2.3-53.el5.ppc.rpm | SHA-256: 80cb756c7fd0771133e02c2f346b43711b96fdcd50b9a405af935420ea125cf9 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
httpd-2.2.3-53.el5.src.rpm | SHA-256: af5f78f383ba38d7692b8662edfc3404d8282e53feea9441e6b59f71368152a0 |
x86_64 | |
httpd-2.2.3-53.el5.x86_64.rpm | SHA-256: aacdec674e841e8b801fc6d0b189a13b3e8ccfa754c8d8e73917684a3b8d29f1 |
httpd-devel-2.2.3-53.el5.i386.rpm | SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6 |
httpd-devel-2.2.3-53.el5.x86_64.rpm | SHA-256: e2081edb7e1b28604c321e759ce72bb418da015b0bc10ca7ddd0be1c83d40d46 |
httpd-manual-2.2.3-53.el5.x86_64.rpm | SHA-256: 66cc0aae3b1b67f038ad2801fe7ca263a076f1c87d4f8eeb96d4a3ef2cc4fd8e |
mod_ssl-2.2.3-53.el5.x86_64.rpm | SHA-256: 550aee2aa49b129041ebb85ecac4dc0511c74531f3d22cfb7454751269f8fdbb |
i386 | |
httpd-2.2.3-53.el5.i386.rpm | SHA-256: 532c3db8bfca8afef9951cf21901adeb31eaef5ee58c3b5a9ce44a0e6ae6119c |
httpd-devel-2.2.3-53.el5.i386.rpm | SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6 |
httpd-manual-2.2.3-53.el5.i386.rpm | SHA-256: 28cfe0c5e86df0d9a9c3b630a97b631f6ac87ca2eaf87b5bbde9147bd6167b23 |
mod_ssl-2.2.3-53.el5.i386.rpm | SHA-256: 7cd6dc1280be416895825ed3627657281f74c0cfd03a6479f813b54979a701a5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.