Skip to navigation

Bug Fix Advisory httpd bug fix update

Advisory: RHBA-2011:1630-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-12-06
Last updated on: 2011-12-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated httpd packages that fix several bugs are now available for Red Hat
Enterprise Linux 6.

The Apache HTTP Server is a popular web server.

These updated httpd packages provide fixes for the following bugs:

* The Apache module "mod_proxy" implements a proxy or gateway for the Apache web
server. The "ProxyErrorOverride On" option did not work if used with
"mod_proxy_ajp", the AJP support module for mod_proxy. Consequently when
accessing a 404 URL in the "/static" context, which was proxied with AJP, the
404 page from the proxy was displayed rather than the 404 page from Apache
itself. This update corrects the code and accessing 404 URLs now works as
intended, via Apache, as defined in "ErrorDocument". (BZ#694939)

* When a backend server sends data via SSL, and is using chunked transfer
encoding, the backend splits the chunk between two different SSL blocks. Prior
to this update, when transferring data via SSL through a reverse proxy
implemented with Apache, "mod_proxy", and "mod_ssl", the end of the first SSL
block was sometimes lost and the length of the next chunk was thus invalid.
Consequently, files were sometimes corrupted during transfer via SSL. This
updates implements a backported fix to this problem and the error no longer
occurs. (BZ#700074)

* The "FilterProvider" directive of the "mod_filter" module was unable to match
against non-standard HTTP response headers. Consequently, output content data
was not filtered or processed as expected by httpd in certain configurations.
With this update, a backported patch has been applied to address this issue, and
the FilterProvider directive is now able to match against non-standard HTTP
response headers as expected. (BZ#700075)

* In situations where httpd could not allocate memory, httpd sometimes
terminated unexpectedly with a segmentation fault rather than terminating the
process with an error message. With this update, a patch has been applied to
correct this issue and httpd no longer crashes in the scenario described.
(BZ#700393)

* Server Name Indication (SNI) sends the name of the virtual domain as part of
the TLS negotiation. Prior to this enhancement, if a client sent the wrong SNI
data the client would be rejected. With this update, in configurations where SNI
is not required, "mod_ssl" can ignore the SNI hostname "hint". (BZ#714704)

* Prior to this update, httpd terminated unexpectedly on startup with a
segmentation fault when proxy client certificates were shared across multiple
virtual hosts (using the SSLProxyMachineCertificateFile directive). With this
update a patch has been applied and httpd no longer crashes in the scenario
described. (BZ# 720980)

* When the "SSLCryptoDevice" config variable in "ssl.conf" was set to an unknown
or invalid value, the httpd daemon would terminate unexpectedly with a
segmentation fault at startup. With this update the code has been corrected,
httpd no longer crashes, and httpd will issue an appropriate error message in
this scenario. (BZ#729585)

* If using mod_proxy_ftp, an httpd process could terminated unexpectedly with a
segmentation fault when tests were made on an IPv6 localhost enabled machine.
This update implements improvements to the code and the mod_proxy_ftp process no
longer crashes in the scenario described. (BZ#737960)

* When using the "mod_cache" module, by default, the "CacheMaxExpire" directive
is only applied to responses which do not specify their expiry date. Previously,
it was not possible to limit the maximum expiry time for all resources. This
update applies a patch which adapts the mod_cache module to provide support for
"hard" as a second argument of the CacheMaxExpire directive, allowing a maximum
expiry time to be enforced for all resources. (BZ#740242)

* The "mod_reqtimeout" module, when enabled, allows fine-grained timeouts to be
applied during request parsing. The mod_reqtimeout module has been backported
from upstream in this update. (BZ#676634)

All users of httpd are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
httpd-2.2.15-15.el6.src.rpm
File outdated by:  RHSA-2014:0370
    MD5: b0afc16a71381a01db7cbb16555605a1
SHA-256: f6d8902d0d994b4859d36ab13d8982573a1a6b59934e45b85cc5a9c65bb7577b
 
IA-32:
httpd-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: d26d6fa0979561e9fef67050d903af9e
SHA-256: 36f258b268375cea89b95da376b986ef67cc5f2185421bf9060b383063a39809
httpd-debuginfo-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: e7fda2d756155fba15511d3d5a929227
SHA-256: ee3682adaa7752988084572cd73503fece8b45f37c103125e68d29ee43b9a1ea
httpd-devel-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: dbeff71450afa5fcca52a638a447652b
SHA-256: b68518b27c26272975fe7131a36304c9eed604c5d0fc65a82d35f24f8fab74b6
httpd-manual-2.2.15-15.el6.noarch.rpm
File outdated by:  RHSA-2014:0370
    MD5: b931c0840e991f9e5ea09f7d15b82939
SHA-256: eea4649a6c1bebbde0377fccb11faaa762cffdaf86ca5df805ea665871fa3b23
httpd-tools-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: 1a90306c7ea9e7148ba71ee1bd75bd9c
SHA-256: 58d3dae0151effafd34eec192c602318f049bb29c14fd3832791aa7e28b772f0
mod_ssl-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: 4df5a8d2da822293371fa30b6cbe3e47
SHA-256: dca9ed9facb4a70b6a74455ac47b8fbf639376abde94aeff9fd7583dde88ab46
 
x86_64:
httpd-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: c3b7f8751829be3eeda96840d8caa613
SHA-256: 3da063786ab92cf70b84516cbd518ceb51e1d8bdf3db8c81fe5907f2fd8cf039
httpd-debuginfo-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: e7fda2d756155fba15511d3d5a929227
SHA-256: ee3682adaa7752988084572cd73503fece8b45f37c103125e68d29ee43b9a1ea
httpd-debuginfo-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 640dbbe49bcf9f6177704059ed85be49
SHA-256: f434a4b204b8234cf20c253630f0acaed2388c3a3e2b73b8d1961fdadde97e21
httpd-devel-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: dbeff71450afa5fcca52a638a447652b
SHA-256: b68518b27c26272975fe7131a36304c9eed604c5d0fc65a82d35f24f8fab74b6
httpd-devel-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: acc6a886e6fdfba5d452562716e34c73
SHA-256: 655efbca575e63710f8c015374e001306c0320b99ea4438b31f1cf4ca484c662
httpd-manual-2.2.15-15.el6.noarch.rpm
File outdated by:  RHSA-2014:0370
    MD5: b931c0840e991f9e5ea09f7d15b82939
SHA-256: eea4649a6c1bebbde0377fccb11faaa762cffdaf86ca5df805ea665871fa3b23
httpd-tools-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 20f7c29aca8aca06c2fc97d17ac84542
SHA-256: da2fc541565b61b90dc2e54b2e5117d6f55a7f7582f7c07cf5744aec2c00886e
mod_ssl-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 1eadb9b6a171e8a4beb5b70d691d8c6e
SHA-256: 7182b265a220d4dd502b201d94c76f09e09a469238b7a366dddb4ece5eb9cf22
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
httpd-2.2.15-15.el6.src.rpm
File outdated by:  RHSA-2014:0370
    MD5: b0afc16a71381a01db7cbb16555605a1
SHA-256: f6d8902d0d994b4859d36ab13d8982573a1a6b59934e45b85cc5a9c65bb7577b
 
x86_64:
httpd-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: c3b7f8751829be3eeda96840d8caa613
SHA-256: 3da063786ab92cf70b84516cbd518ceb51e1d8bdf3db8c81fe5907f2fd8cf039
httpd-debuginfo-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: e7fda2d756155fba15511d3d5a929227
SHA-256: ee3682adaa7752988084572cd73503fece8b45f37c103125e68d29ee43b9a1ea
httpd-debuginfo-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 640dbbe49bcf9f6177704059ed85be49
SHA-256: f434a4b204b8234cf20c253630f0acaed2388c3a3e2b73b8d1961fdadde97e21
httpd-devel-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: dbeff71450afa5fcca52a638a447652b
SHA-256: b68518b27c26272975fe7131a36304c9eed604c5d0fc65a82d35f24f8fab74b6
httpd-devel-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: acc6a886e6fdfba5d452562716e34c73
SHA-256: 655efbca575e63710f8c015374e001306c0320b99ea4438b31f1cf4ca484c662
httpd-manual-2.2.15-15.el6.noarch.rpm
File outdated by:  RHSA-2014:0370
    MD5: b931c0840e991f9e5ea09f7d15b82939
SHA-256: eea4649a6c1bebbde0377fccb11faaa762cffdaf86ca5df805ea665871fa3b23
httpd-tools-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 20f7c29aca8aca06c2fc97d17ac84542
SHA-256: da2fc541565b61b90dc2e54b2e5117d6f55a7f7582f7c07cf5744aec2c00886e
mod_ssl-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 1eadb9b6a171e8a4beb5b70d691d8c6e
SHA-256: 7182b265a220d4dd502b201d94c76f09e09a469238b7a366dddb4ece5eb9cf22
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
httpd-2.2.15-15.el6.src.rpm
File outdated by:  RHSA-2014:0370
    MD5: b0afc16a71381a01db7cbb16555605a1
SHA-256: f6d8902d0d994b4859d36ab13d8982573a1a6b59934e45b85cc5a9c65bb7577b
 
IA-32:
httpd-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: d26d6fa0979561e9fef67050d903af9e
SHA-256: 36f258b268375cea89b95da376b986ef67cc5f2185421bf9060b383063a39809
httpd-debuginfo-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: e7fda2d756155fba15511d3d5a929227
SHA-256: ee3682adaa7752988084572cd73503fece8b45f37c103125e68d29ee43b9a1ea
httpd-devel-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: dbeff71450afa5fcca52a638a447652b
SHA-256: b68518b27c26272975fe7131a36304c9eed604c5d0fc65a82d35f24f8fab74b6
httpd-manual-2.2.15-15.el6.noarch.rpm
File outdated by:  RHSA-2014:0370
    MD5: b931c0840e991f9e5ea09f7d15b82939
SHA-256: eea4649a6c1bebbde0377fccb11faaa762cffdaf86ca5df805ea665871fa3b23
httpd-tools-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: 1a90306c7ea9e7148ba71ee1bd75bd9c
SHA-256: 58d3dae0151effafd34eec192c602318f049bb29c14fd3832791aa7e28b772f0
mod_ssl-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: 4df5a8d2da822293371fa30b6cbe3e47
SHA-256: dca9ed9facb4a70b6a74455ac47b8fbf639376abde94aeff9fd7583dde88ab46
 
PPC:
httpd-2.2.15-15.el6.ppc64.rpm
File outdated by:  RHSA-2014:0370
    MD5: aa8cc41654cb1273e6fbc3face30b84f
SHA-256: c28d872ba8e6c464e7556f9e9e39fbea74b08b0bdc4569dbc49e9b6559515a9e
httpd-debuginfo-2.2.15-15.el6.ppc.rpm
File outdated by:  RHSA-2014:0370
    MD5: 11a8147bbb3b98ebdae90bbd0f10507f
SHA-256: c33bd4c00a5ebb5063dffe709c0c80170db5921b7c78e8793ac0d7b4d445729b
httpd-debuginfo-2.2.15-15.el6.ppc64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 4a33001fbd9f93c01cb5754ec312da52
SHA-256: cf4b3d7f7be8ec09ab73cd82f5af90ce163b89f2820aebab61d98f2d5c3151fe
httpd-devel-2.2.15-15.el6.ppc.rpm
File outdated by:  RHSA-2014:0370
    MD5: 9ba57c7bb03000561b282b1d83ffaea6
SHA-256: 8d03cf956c0b3b322145ba658fdb7190dfb6dfb9d841399bf35ccb6f49572d90
httpd-devel-2.2.15-15.el6.ppc64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 306db808ad06a7a9614660b21393a4ef
SHA-256: 93960a36aaf29483a08b9035b70840de77cf9542cbee437f974149221758e8e4
httpd-manual-2.2.15-15.el6.noarch.rpm
File outdated by:  RHSA-2014:0370
    MD5: b931c0840e991f9e5ea09f7d15b82939
SHA-256: eea4649a6c1bebbde0377fccb11faaa762cffdaf86ca5df805ea665871fa3b23
httpd-tools-2.2.15-15.el6.ppc64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 7308dbeb604251a5d6f54b62bbfc923c
SHA-256: 4d9b9d7e5c418d7eee0ec1617047d4e9447f6f5aa775a062be277dbb3c9a587e
mod_ssl-2.2.15-15.el6.ppc64.rpm
File outdated by:  RHSA-2014:0370
    MD5: a6948fac6a57e0005cb2d4a82228680f
SHA-256: 3b15058ee1ef2cb8678c1a541c37187580273c545821e518cc9573ede2e421c0
 
s390x:
httpd-2.2.15-15.el6.s390x.rpm
File outdated by:  RHSA-2014:0370
    MD5: e3d6c3aa6c421d2d97cc467dc9e89aae
SHA-256: 21874baa634e7762119f05bf24194fb3716cd08401cfc57105c30f1fa01655f7
httpd-debuginfo-2.2.15-15.el6.s390.rpm
File outdated by:  RHSA-2014:0370
    MD5: c393b40e82fc32b40695350a68099cbb
SHA-256: ada135f5abf794870a19e512bcbbb5740a6d939a3e7ffbaef5a6ca38866ae173
httpd-debuginfo-2.2.15-15.el6.s390x.rpm
File outdated by:  RHSA-2014:0370
    MD5: aedfaebe914e6448855c9552951784e7
SHA-256: 0477622ca4614b655d950bdbe6b95e97226699b38df9e14a90a2a540dd9722fe
httpd-devel-2.2.15-15.el6.s390.rpm
File outdated by:  RHSA-2014:0370
    MD5: cb8d6d6ccde37e51aae9796dad241cfb
SHA-256: 88a3fd17dd9929b50a45f0178c89e8745d474a1dcc758d0a5df6a5ae61f38b7e
httpd-devel-2.2.15-15.el6.s390x.rpm
File outdated by:  RHSA-2014:0370
    MD5: a5b2d26daf0f2c838d58c658492fee51
SHA-256: 9d0b0ec8eb4d00bf3fe668c0cfc6903ff33bfd813457c456de81a70ddada2eff
httpd-manual-2.2.15-15.el6.noarch.rpm
File outdated by:  RHSA-2014:0370
    MD5: b931c0840e991f9e5ea09f7d15b82939
SHA-256: eea4649a6c1bebbde0377fccb11faaa762cffdaf86ca5df805ea665871fa3b23
httpd-tools-2.2.15-15.el6.s390x.rpm
File outdated by:  RHSA-2014:0370
    MD5: d0088cbac591e93233ffa2cd09dcb575
SHA-256: 1fb6e587af806c2c94f1fd8ef503698a3b4280d3cb450c31e61acac739dd32a6
mod_ssl-2.2.15-15.el6.s390x.rpm
File outdated by:  RHSA-2014:0370
    MD5: f13198f48c32eb247054fa4efb95e7a4
SHA-256: bd1921cacf4222f05aa6c87b9bbeaa4f8600151240a6b8f27bd76c5364792ce6
 
x86_64:
httpd-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: c3b7f8751829be3eeda96840d8caa613
SHA-256: 3da063786ab92cf70b84516cbd518ceb51e1d8bdf3db8c81fe5907f2fd8cf039
httpd-debuginfo-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: e7fda2d756155fba15511d3d5a929227
SHA-256: ee3682adaa7752988084572cd73503fece8b45f37c103125e68d29ee43b9a1ea
httpd-debuginfo-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 640dbbe49bcf9f6177704059ed85be49
SHA-256: f434a4b204b8234cf20c253630f0acaed2388c3a3e2b73b8d1961fdadde97e21
httpd-devel-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: dbeff71450afa5fcca52a638a447652b
SHA-256: b68518b27c26272975fe7131a36304c9eed604c5d0fc65a82d35f24f8fab74b6
httpd-devel-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: acc6a886e6fdfba5d452562716e34c73
SHA-256: 655efbca575e63710f8c015374e001306c0320b99ea4438b31f1cf4ca484c662
httpd-manual-2.2.15-15.el6.noarch.rpm
File outdated by:  RHSA-2014:0370
    MD5: b931c0840e991f9e5ea09f7d15b82939
SHA-256: eea4649a6c1bebbde0377fccb11faaa762cffdaf86ca5df805ea665871fa3b23
httpd-tools-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 20f7c29aca8aca06c2fc97d17ac84542
SHA-256: da2fc541565b61b90dc2e54b2e5117d6f55a7f7582f7c07cf5744aec2c00886e
mod_ssl-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 1eadb9b6a171e8a4beb5b70d691d8c6e
SHA-256: 7182b265a220d4dd502b201d94c76f09e09a469238b7a366dddb4ece5eb9cf22
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
httpd-2.2.15-15.el6.src.rpm
File outdated by:  RHSA-2014:0370
    MD5: b0afc16a71381a01db7cbb16555605a1
SHA-256: f6d8902d0d994b4859d36ab13d8982573a1a6b59934e45b85cc5a9c65bb7577b
 
IA-32:
httpd-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: d26d6fa0979561e9fef67050d903af9e
SHA-256: 36f258b268375cea89b95da376b986ef67cc5f2185421bf9060b383063a39809
httpd-debuginfo-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: e7fda2d756155fba15511d3d5a929227
SHA-256: ee3682adaa7752988084572cd73503fece8b45f37c103125e68d29ee43b9a1ea
httpd-devel-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: dbeff71450afa5fcca52a638a447652b
SHA-256: b68518b27c26272975fe7131a36304c9eed604c5d0fc65a82d35f24f8fab74b6
httpd-manual-2.2.15-15.el6.noarch.rpm
File outdated by:  RHSA-2014:0370
    MD5: b931c0840e991f9e5ea09f7d15b82939
SHA-256: eea4649a6c1bebbde0377fccb11faaa762cffdaf86ca5df805ea665871fa3b23
httpd-tools-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: 1a90306c7ea9e7148ba71ee1bd75bd9c
SHA-256: 58d3dae0151effafd34eec192c602318f049bb29c14fd3832791aa7e28b772f0
mod_ssl-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: 4df5a8d2da822293371fa30b6cbe3e47
SHA-256: dca9ed9facb4a70b6a74455ac47b8fbf639376abde94aeff9fd7583dde88ab46
 
x86_64:
httpd-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: c3b7f8751829be3eeda96840d8caa613
SHA-256: 3da063786ab92cf70b84516cbd518ceb51e1d8bdf3db8c81fe5907f2fd8cf039
httpd-debuginfo-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: e7fda2d756155fba15511d3d5a929227
SHA-256: ee3682adaa7752988084572cd73503fece8b45f37c103125e68d29ee43b9a1ea
httpd-debuginfo-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 640dbbe49bcf9f6177704059ed85be49
SHA-256: f434a4b204b8234cf20c253630f0acaed2388c3a3e2b73b8d1961fdadde97e21
httpd-devel-2.2.15-15.el6.i686.rpm
File outdated by:  RHSA-2014:0370
    MD5: dbeff71450afa5fcca52a638a447652b
SHA-256: b68518b27c26272975fe7131a36304c9eed604c5d0fc65a82d35f24f8fab74b6
httpd-devel-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: acc6a886e6fdfba5d452562716e34c73
SHA-256: 655efbca575e63710f8c015374e001306c0320b99ea4438b31f1cf4ca484c662
httpd-manual-2.2.15-15.el6.noarch.rpm
File outdated by:  RHSA-2014:0370
    MD5: b931c0840e991f9e5ea09f7d15b82939
SHA-256: eea4649a6c1bebbde0377fccb11faaa762cffdaf86ca5df805ea665871fa3b23
httpd-tools-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 20f7c29aca8aca06c2fc97d17ac84542
SHA-256: da2fc541565b61b90dc2e54b2e5117d6f55a7f7582f7c07cf5744aec2c00886e
mod_ssl-2.2.15-15.el6.x86_64.rpm
File outdated by:  RHSA-2014:0370
    MD5: 1eadb9b6a171e8a4beb5b70d691d8c6e
SHA-256: 7182b265a220d4dd502b201d94c76f09e09a469238b7a366dddb4ece5eb9cf22
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

676634 - update mod_reqtimeout to 2.2.17
694939 - mod_proxy_ajp does not honor "ProxyErrorOverride"
700074 - mod_proxy with SSLProxyEngine truncates files fetched with chunked encoding Summary
700075 - mod_filter cannot match against response headers from CGI script
729585 - httpd segfaults when SSLCryptoDevice set to invalid
740242 - Apache CacheMaxExpire directive ignored (upstream reported bug with patch)



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/