- Issued:
- 2007-04-28
- Updated:
- 2007-04-28
RHBA-2007:0209 - Bug Fix Advisory
Synopsis
httpd bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated httpd packages that fix several bugs are now available.
Description
The Apache HTTP Server is a popular and freely-available Web server.
A race condition was found in the httpd init script. When stopping or
restarting the httpd service using the init script, it was possible for the
httpd parent process to be terminated before all child processes had
exited. This could leave zombie processes.
A bug in the handling of malformed response headers could cause a child
process crash if using the mod_disk_cache module.
A bug in the mod_deflate module could cause corrupt response pages if used
to compress responses when configured as a reverse proxy.
The logresolve utility was unable to read lines longer the 1024 bytes.
Users of the httpd package are advised to upgrade to the updated packages,
which resolve these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 207071 - long lines incorrectly handled by Apache's logresolve
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
httpd-2.0.52-32.ent.src.rpm | SHA-256: 8a9659a35aa48e6c7fe5c07ac45a5a061ea3e031af83633768895abe9b1e6873 |
x86_64 | |
httpd-2.0.52-32.ent.x86_64.rpm | SHA-256: 42430f76ae1769d1403e4ac2d2cf21341644b5462594ede2b26adf6e4e727695 |
httpd-2.0.52-32.ent.x86_64.rpm | SHA-256: 42430f76ae1769d1403e4ac2d2cf21341644b5462594ede2b26adf6e4e727695 |
httpd-devel-2.0.52-32.ent.x86_64.rpm | SHA-256: e23f7019f5583665f70a1077702767ac64ca0e2cb2580f6c9fafa236d8343d7e |
httpd-devel-2.0.52-32.ent.x86_64.rpm | SHA-256: e23f7019f5583665f70a1077702767ac64ca0e2cb2580f6c9fafa236d8343d7e |
httpd-manual-2.0.52-32.ent.x86_64.rpm | SHA-256: e8d701b7c8f1b65406252d1b2f4a8199798b5c42b4963064c2e1736c901a5518 |
httpd-manual-2.0.52-32.ent.x86_64.rpm | SHA-256: e8d701b7c8f1b65406252d1b2f4a8199798b5c42b4963064c2e1736c901a5518 |
httpd-suexec-2.0.52-32.ent.x86_64.rpm | SHA-256: dbedad604d79d25ca1f056e08dee96f7c303035b45bb11bfceda3c9c7afaedd6 |
httpd-suexec-2.0.52-32.ent.x86_64.rpm | SHA-256: dbedad604d79d25ca1f056e08dee96f7c303035b45bb11bfceda3c9c7afaedd6 |
mod_ssl-2.0.52-32.ent.x86_64.rpm | SHA-256: c5cf552382a3d6fd0f7fc0007f675aaeecdcab418b67369d2efa86287c53ef35 |
mod_ssl-2.0.52-32.ent.x86_64.rpm | SHA-256: c5cf552382a3d6fd0f7fc0007f675aaeecdcab418b67369d2efa86287c53ef35 |
ia64 | |
httpd-2.0.52-32.ent.ia64.rpm | SHA-256: 5da62ca2d4636e03142a7a5f4f483bebf9550eab9cc632f29ff64f30499b99a5 |
httpd-2.0.52-32.ent.ia64.rpm | SHA-256: 5da62ca2d4636e03142a7a5f4f483bebf9550eab9cc632f29ff64f30499b99a5 |
httpd-devel-2.0.52-32.ent.ia64.rpm | SHA-256: 8ba4be804c5468e0210dd1f7f8428589dc38bf9b05e44213b2e7b53adc7cba56 |
httpd-devel-2.0.52-32.ent.ia64.rpm | SHA-256: 8ba4be804c5468e0210dd1f7f8428589dc38bf9b05e44213b2e7b53adc7cba56 |
httpd-manual-2.0.52-32.ent.ia64.rpm | SHA-256: b5a58cf75b13cc1188e7db7423c92f41788c4f418302303dcc5224f54acead88 |
httpd-manual-2.0.52-32.ent.ia64.rpm | SHA-256: b5a58cf75b13cc1188e7db7423c92f41788c4f418302303dcc5224f54acead88 |
httpd-suexec-2.0.52-32.ent.ia64.rpm | SHA-256: 0ff747a52bcd9e198471d8744417d9917ddc47c710153cc6e76c994128b8473c |
httpd-suexec-2.0.52-32.ent.ia64.rpm | SHA-256: 0ff747a52bcd9e198471d8744417d9917ddc47c710153cc6e76c994128b8473c |
mod_ssl-2.0.52-32.ent.ia64.rpm | SHA-256: 4ee51a32e55633aceb5dfa4d8e7dc3a5617b986eade0cb4e460a192e7813a02c |
mod_ssl-2.0.52-32.ent.ia64.rpm | SHA-256: 4ee51a32e55633aceb5dfa4d8e7dc3a5617b986eade0cb4e460a192e7813a02c |
i386 | |
httpd-2.0.52-32.ent.i386.rpm | SHA-256: 0d2248356a372865503d95dcc16793927c0737f04f75e2eda9d0e0bfb1cd2e32 |
httpd-2.0.52-32.ent.i386.rpm | SHA-256: 0d2248356a372865503d95dcc16793927c0737f04f75e2eda9d0e0bfb1cd2e32 |
httpd-devel-2.0.52-32.ent.i386.rpm | SHA-256: f4f7cc4a513578a1b2e188ab922947b93251ca41930344449ff99c6880f0b90d |
httpd-devel-2.0.52-32.ent.i386.rpm | SHA-256: f4f7cc4a513578a1b2e188ab922947b93251ca41930344449ff99c6880f0b90d |
httpd-manual-2.0.52-32.ent.i386.rpm | SHA-256: 810fea347364a1bcfe33c567d78ff4f0ff3c15b30d646434e47faac87019033f |
httpd-manual-2.0.52-32.ent.i386.rpm | SHA-256: 810fea347364a1bcfe33c567d78ff4f0ff3c15b30d646434e47faac87019033f |
httpd-suexec-2.0.52-32.ent.i386.rpm | SHA-256: a82c58ca4f5bf4bdf05abf0a0dce404bc9a4d13d47a2551392910359d031f445 |
httpd-suexec-2.0.52-32.ent.i386.rpm | SHA-256: a82c58ca4f5bf4bdf05abf0a0dce404bc9a4d13d47a2551392910359d031f445 |
mod_ssl-2.0.52-32.ent.i386.rpm | SHA-256: cd60f67c9d8acd1a431710fbc92ed3000549a3a7da37f6c867668025ce4c02f3 |
mod_ssl-2.0.52-32.ent.i386.rpm | SHA-256: cd60f67c9d8acd1a431710fbc92ed3000549a3a7da37f6c867668025ce4c02f3 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
httpd-2.0.52-32.ent.src.rpm | SHA-256: 8a9659a35aa48e6c7fe5c07ac45a5a061ea3e031af83633768895abe9b1e6873 |
x86_64 | |
httpd-2.0.52-32.ent.x86_64.rpm | SHA-256: 42430f76ae1769d1403e4ac2d2cf21341644b5462594ede2b26adf6e4e727695 |
httpd-devel-2.0.52-32.ent.x86_64.rpm | SHA-256: e23f7019f5583665f70a1077702767ac64ca0e2cb2580f6c9fafa236d8343d7e |
httpd-manual-2.0.52-32.ent.x86_64.rpm | SHA-256: e8d701b7c8f1b65406252d1b2f4a8199798b5c42b4963064c2e1736c901a5518 |
httpd-suexec-2.0.52-32.ent.x86_64.rpm | SHA-256: dbedad604d79d25ca1f056e08dee96f7c303035b45bb11bfceda3c9c7afaedd6 |
mod_ssl-2.0.52-32.ent.x86_64.rpm | SHA-256: c5cf552382a3d6fd0f7fc0007f675aaeecdcab418b67369d2efa86287c53ef35 |
ia64 | |
httpd-2.0.52-32.ent.ia64.rpm | SHA-256: 5da62ca2d4636e03142a7a5f4f483bebf9550eab9cc632f29ff64f30499b99a5 |
httpd-devel-2.0.52-32.ent.ia64.rpm | SHA-256: 8ba4be804c5468e0210dd1f7f8428589dc38bf9b05e44213b2e7b53adc7cba56 |
httpd-manual-2.0.52-32.ent.ia64.rpm | SHA-256: b5a58cf75b13cc1188e7db7423c92f41788c4f418302303dcc5224f54acead88 |
httpd-suexec-2.0.52-32.ent.ia64.rpm | SHA-256: 0ff747a52bcd9e198471d8744417d9917ddc47c710153cc6e76c994128b8473c |
mod_ssl-2.0.52-32.ent.ia64.rpm | SHA-256: 4ee51a32e55633aceb5dfa4d8e7dc3a5617b986eade0cb4e460a192e7813a02c |
i386 | |
httpd-2.0.52-32.ent.i386.rpm | SHA-256: 0d2248356a372865503d95dcc16793927c0737f04f75e2eda9d0e0bfb1cd2e32 |
httpd-devel-2.0.52-32.ent.i386.rpm | SHA-256: f4f7cc4a513578a1b2e188ab922947b93251ca41930344449ff99c6880f0b90d |
httpd-manual-2.0.52-32.ent.i386.rpm | SHA-256: 810fea347364a1bcfe33c567d78ff4f0ff3c15b30d646434e47faac87019033f |
httpd-suexec-2.0.52-32.ent.i386.rpm | SHA-256: a82c58ca4f5bf4bdf05abf0a0dce404bc9a4d13d47a2551392910359d031f445 |
mod_ssl-2.0.52-32.ent.i386.rpm | SHA-256: cd60f67c9d8acd1a431710fbc92ed3000549a3a7da37f6c867668025ce4c02f3 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
httpd-2.0.52-32.ent.src.rpm | SHA-256: 8a9659a35aa48e6c7fe5c07ac45a5a061ea3e031af83633768895abe9b1e6873 |
x86_64 | |
httpd-2.0.52-32.ent.x86_64.rpm | SHA-256: 42430f76ae1769d1403e4ac2d2cf21341644b5462594ede2b26adf6e4e727695 |
httpd-devel-2.0.52-32.ent.x86_64.rpm | SHA-256: e23f7019f5583665f70a1077702767ac64ca0e2cb2580f6c9fafa236d8343d7e |
httpd-manual-2.0.52-32.ent.x86_64.rpm | SHA-256: e8d701b7c8f1b65406252d1b2f4a8199798b5c42b4963064c2e1736c901a5518 |
httpd-suexec-2.0.52-32.ent.x86_64.rpm | SHA-256: dbedad604d79d25ca1f056e08dee96f7c303035b45bb11bfceda3c9c7afaedd6 |
mod_ssl-2.0.52-32.ent.x86_64.rpm | SHA-256: c5cf552382a3d6fd0f7fc0007f675aaeecdcab418b67369d2efa86287c53ef35 |
i386 | |
httpd-2.0.52-32.ent.i386.rpm | SHA-256: 0d2248356a372865503d95dcc16793927c0737f04f75e2eda9d0e0bfb1cd2e32 |
httpd-devel-2.0.52-32.ent.i386.rpm | SHA-256: f4f7cc4a513578a1b2e188ab922947b93251ca41930344449ff99c6880f0b90d |
httpd-manual-2.0.52-32.ent.i386.rpm | SHA-256: 810fea347364a1bcfe33c567d78ff4f0ff3c15b30d646434e47faac87019033f |
httpd-suexec-2.0.52-32.ent.i386.rpm | SHA-256: a82c58ca4f5bf4bdf05abf0a0dce404bc9a4d13d47a2551392910359d031f445 |
mod_ssl-2.0.52-32.ent.i386.rpm | SHA-256: cd60f67c9d8acd1a431710fbc92ed3000549a3a7da37f6c867668025ce4c02f3 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
httpd-2.0.52-32.ent.src.rpm | SHA-256: 8a9659a35aa48e6c7fe5c07ac45a5a061ea3e031af83633768895abe9b1e6873 |
s390x | |
httpd-2.0.52-32.ent.s390x.rpm | SHA-256: ae86946349dc27e6ba319268906bc6a1c2c5e079b920f96ee19bd56db50e46d1 |
httpd-devel-2.0.52-32.ent.s390x.rpm | SHA-256: ea63fca6b35e8cf4a0457172d00ecfacb2883f8dae46bffeb9e5672a202465c4 |
httpd-manual-2.0.52-32.ent.s390x.rpm | SHA-256: 993b9e88d2bce8990638ad12b69a4778c4f93c365d319b3f3cb16b0226e4021c |
httpd-suexec-2.0.52-32.ent.s390x.rpm | SHA-256: 636235783fb22f1ad030dc0847e6b85f98f8b3bf81c281337d59cb3c96e24d63 |
mod_ssl-2.0.52-32.ent.s390x.rpm | SHA-256: 6ecf6fd7801f2693b17e8224edc96e366475ba19b0121333af41ebb2f7e2ead3 |
s390 | |
httpd-2.0.52-32.ent.s390.rpm | SHA-256: 1ff5fa5d03d07426e2c525e250c4b6d4e8446938e3181f55d8bedb52ed498ddd |
httpd-devel-2.0.52-32.ent.s390.rpm | SHA-256: 9f0d7ba4eed526a9540849c4fef0853ba915775c35068309e6905e22fbc95fb9 |
httpd-manual-2.0.52-32.ent.s390.rpm | SHA-256: e62778932979202b91274b1e170201f255ab1196ae35ef31e0571ad0fcbce327 |
httpd-suexec-2.0.52-32.ent.s390.rpm | SHA-256: ce2b82549e14f9eafca8e364d92b2abe7b198298da22dc1318a0ae961ade2f61 |
mod_ssl-2.0.52-32.ent.s390.rpm | SHA-256: 1f7a4e29c59a9e92704b7e6ed50607dbc03cd41bd0134cc3f35638b546c0f054 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
httpd-2.0.52-32.ent.src.rpm | SHA-256: 8a9659a35aa48e6c7fe5c07ac45a5a061ea3e031af83633768895abe9b1e6873 |
ppc | |
httpd-2.0.52-32.ent.ppc.rpm | SHA-256: 5074df22b7c53a9f5e6e992f22ecfb7b1274d8dc5afe6f98eb9781483537c810 |
httpd-devel-2.0.52-32.ent.ppc.rpm | SHA-256: e8de065dc6a0bd10847966dd43b4875c1fc6d77cb5b57753034893631637d29f |
httpd-manual-2.0.52-32.ent.ppc.rpm | SHA-256: 37ef66a28330685e257bd89a480778abd327209ba38ea65f86af933f5f23c4db |
httpd-suexec-2.0.52-32.ent.ppc.rpm | SHA-256: 2b40031b114e772ebf65699788ce96c0356dc593435631577ed9deb1d4f80a81 |
mod_ssl-2.0.52-32.ent.ppc.rpm | SHA-256: f9eec3fb5eee33d1b14bfd86ff7559680341a006af8446bc625949a33a880078 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.