- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0261 - Bug Fix Advisory
Synopsis
httpd bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated httpd packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 5.
Description
The Apache HTTP Server ("httpd") is the namesake project of The Apache Software
Foundation.
These updated httpd packages provide fixes for the following bugs:
- In situations when httpd could not allocate memory, httpd sometimes terminated
unexpectedly with a segmentation fault rather than terminating the process with
an error message. With this update, a patch has been applied to correct this bug
and httpd no longer crashes in the scenario described. (BZ#700322)
- When the "SSLCryptoDevice" config variable in "ssl.conf" was set to an unknown
or invalid value, the httpd daemon would terminate unexpectedly with a
segmentation fault at startup. With this update the code has been corrected,
httpd no longer crashes, and httpd issues an appropriate error message in this
scenario. (BZ#767990)
In addition, these updated httpd packages provide the following enhancements:
- The rotatelogs program now provides a new "rotatelogs -c" option to create log
files for each set interval, even if empty. (BZ#677279)
- The rotatelogs program now provides a new "rotatelogs -p" option to execute a
custom program after each log rotation. (BZ#677288)
- The Apache module mod_proxy now allows changing the BalancerMember state in
the web interface. (BZ#709869)
- The Apache module mod_alias now supports redirecting to a local path (that is,
a partial URL). (BZ#714725)
- The Apache module mod_proxy now supports the "connectiontimeout" parameter.
(BZ#719907)
- The httpd service is now automatically restarted after a package upgrade, if
the service is running. (BZ#719941)
Users are advised to upgrade to these updated httpd packages, which fix these
bugs and add these enhancements.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 677279 - [RFE] rotatelogs needs to create files even if they are empty
- BZ - 677288 - [RFE] httpd's rotatelogs needs a way to rotate files into a custom location
- BZ - 767990 - httpd segfaults when SSLCryptoDevice set to invalid
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
httpd-2.2.3-63.el5.src.rpm | SHA-256: 2b8fbf4d55744c36c247fa6383346dafaa27951e366e0e3231bb5230a27c4fd4 |
x86_64 | |
httpd-2.2.3-63.el5.x86_64.rpm | SHA-256: 93febea105260c9658eb5faabcfb3c4d474a68e581c4c254417ff14951412273 |
httpd-devel-2.2.3-63.el5.i386.rpm | SHA-256: 50883b96d9a519fac8b523e711189648d429a4c222985df4e98e5ae693b99425 |
httpd-devel-2.2.3-63.el5.x86_64.rpm | SHA-256: 85f36c7a223e798a71ff615e270a7b4b2510cfb353e0c5440b8a94496b70de78 |
httpd-manual-2.2.3-63.el5.x86_64.rpm | SHA-256: 2ef8a4f040b70cdde17a8475f468b53c1415419337adf4a133b187bb9e68f82d |
mod_ssl-2.2.3-63.el5.x86_64.rpm | SHA-256: 060a91e3d7b8932b1956eafe655a95ed67b3c7ba03cb943a4d708068c5057364 |
ia64 | |
httpd-2.2.3-63.el5.ia64.rpm | SHA-256: 2ca432baa3703ef6d10cf8e42263987a920104e967a5a0fe24709839fee2b3f3 |
httpd-devel-2.2.3-63.el5.ia64.rpm | SHA-256: 3b8d83a8f3e14c60ad22ffd6b8ea896f85fd80aa809e0c84c201ef5dd9d23449 |
httpd-manual-2.2.3-63.el5.ia64.rpm | SHA-256: c752fcc37677dad896716429f9a6851f9eb8c4980eec83dca48cd0a84d9a0d69 |
mod_ssl-2.2.3-63.el5.ia64.rpm | SHA-256: 90f9dc4e8190ee402df5607953b74ae25d35f96a0549762d9dab8ad73f8821f8 |
i386 | |
httpd-2.2.3-63.el5.i386.rpm | SHA-256: 02922e5654b5482e8c3042bb5054b5c84b07360d37fa6094df6edcf142ac21fa |
httpd-devel-2.2.3-63.el5.i386.rpm | SHA-256: 50883b96d9a519fac8b523e711189648d429a4c222985df4e98e5ae693b99425 |
httpd-manual-2.2.3-63.el5.i386.rpm | SHA-256: 1a65ef605815dc38cc5fc77f296f48c2d49bd9f8dab17444c54f2ec3bc4c6d7b |
mod_ssl-2.2.3-63.el5.i386.rpm | SHA-256: 0799887f1e57048ae3b7f4feed7517f3f92ada8478c0693a3bd714eabca8a9ad |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
httpd-2.2.3-63.el5.src.rpm | SHA-256: 2b8fbf4d55744c36c247fa6383346dafaa27951e366e0e3231bb5230a27c4fd4 |
x86_64 | |
httpd-2.2.3-63.el5.x86_64.rpm | SHA-256: 93febea105260c9658eb5faabcfb3c4d474a68e581c4c254417ff14951412273 |
httpd-devel-2.2.3-63.el5.i386.rpm | SHA-256: 50883b96d9a519fac8b523e711189648d429a4c222985df4e98e5ae693b99425 |
httpd-devel-2.2.3-63.el5.x86_64.rpm | SHA-256: 85f36c7a223e798a71ff615e270a7b4b2510cfb353e0c5440b8a94496b70de78 |
httpd-manual-2.2.3-63.el5.x86_64.rpm | SHA-256: 2ef8a4f040b70cdde17a8475f468b53c1415419337adf4a133b187bb9e68f82d |
mod_ssl-2.2.3-63.el5.x86_64.rpm | SHA-256: 060a91e3d7b8932b1956eafe655a95ed67b3c7ba03cb943a4d708068c5057364 |
i386 | |
httpd-2.2.3-63.el5.i386.rpm | SHA-256: 02922e5654b5482e8c3042bb5054b5c84b07360d37fa6094df6edcf142ac21fa |
httpd-devel-2.2.3-63.el5.i386.rpm | SHA-256: 50883b96d9a519fac8b523e711189648d429a4c222985df4e98e5ae693b99425 |
httpd-manual-2.2.3-63.el5.i386.rpm | SHA-256: 1a65ef605815dc38cc5fc77f296f48c2d49bd9f8dab17444c54f2ec3bc4c6d7b |
mod_ssl-2.2.3-63.el5.i386.rpm | SHA-256: 0799887f1e57048ae3b7f4feed7517f3f92ada8478c0693a3bd714eabca8a9ad |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
httpd-2.2.3-63.el5.src.rpm | SHA-256: 2b8fbf4d55744c36c247fa6383346dafaa27951e366e0e3231bb5230a27c4fd4 |
x86_64 | |
httpd-2.2.3-63.el5.x86_64.rpm | SHA-256: 93febea105260c9658eb5faabcfb3c4d474a68e581c4c254417ff14951412273 |
mod_ssl-2.2.3-63.el5.x86_64.rpm | SHA-256: 060a91e3d7b8932b1956eafe655a95ed67b3c7ba03cb943a4d708068c5057364 |
i386 | |
httpd-2.2.3-63.el5.i386.rpm | SHA-256: 02922e5654b5482e8c3042bb5054b5c84b07360d37fa6094df6edcf142ac21fa |
mod_ssl-2.2.3-63.el5.i386.rpm | SHA-256: 0799887f1e57048ae3b7f4feed7517f3f92ada8478c0693a3bd714eabca8a9ad |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
httpd-2.2.3-63.el5.src.rpm | SHA-256: 2b8fbf4d55744c36c247fa6383346dafaa27951e366e0e3231bb5230a27c4fd4 |
s390x | |
httpd-2.2.3-63.el5.s390x.rpm | SHA-256: 97972a248a2d540014a99dbe87e80b5bc291389353a8d873e1f98494ea0d652d |
httpd-devel-2.2.3-63.el5.s390.rpm | SHA-256: db926211c9b8b10a3cbef69b40037c1c1c1101a2b66d0380fc5debba5c5d1946 |
httpd-devel-2.2.3-63.el5.s390x.rpm | SHA-256: 7c4c511bfab207e039df98d0e71819e1d6a333b846606c51499caeae11e95bff |
httpd-manual-2.2.3-63.el5.s390x.rpm | SHA-256: ad4a9fc3294698139a0d2d3b331dedd8561384a639bcb178f06d0f29fc03a85c |
mod_ssl-2.2.3-63.el5.s390x.rpm | SHA-256: af4887f9dea9a8efc120bf0b73cf47ff6849eeeb56786de7f593459433bdee7e |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
httpd-2.2.3-63.el5.src.rpm | SHA-256: 2b8fbf4d55744c36c247fa6383346dafaa27951e366e0e3231bb5230a27c4fd4 |
ppc | |
httpd-2.2.3-63.el5.ppc.rpm | SHA-256: 2c235b69eb50fbfbe9cb414f5f5b7a7cab6a7006d7082d63b90240f86d03708c |
httpd-devel-2.2.3-63.el5.ppc.rpm | SHA-256: f038964a16d3119e00bdd6e8df106aa741a6d79a7f8128fe2caa9425c0e5b458 |
httpd-devel-2.2.3-63.el5.ppc64.rpm | SHA-256: 87c0c9874e5f6a7daa987fb17f4bfef89f37c746170c1a5ac3d2a0389ad0bcff |
httpd-manual-2.2.3-63.el5.ppc.rpm | SHA-256: 12d853dc5a3c7d3de9e439ffb183ed02ea262ad01c80a5b4c1c450f34b4c3ea5 |
mod_ssl-2.2.3-63.el5.ppc.rpm | SHA-256: 6e5a8d97b64f7c96274069b5d3310acc682924bf6ddc01ca37d4d298e5438099 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
httpd-2.2.3-63.el5.src.rpm | SHA-256: 2b8fbf4d55744c36c247fa6383346dafaa27951e366e0e3231bb5230a27c4fd4 |
x86_64 | |
httpd-2.2.3-63.el5.x86_64.rpm | SHA-256: 93febea105260c9658eb5faabcfb3c4d474a68e581c4c254417ff14951412273 |
httpd-devel-2.2.3-63.el5.i386.rpm | SHA-256: 50883b96d9a519fac8b523e711189648d429a4c222985df4e98e5ae693b99425 |
httpd-devel-2.2.3-63.el5.x86_64.rpm | SHA-256: 85f36c7a223e798a71ff615e270a7b4b2510cfb353e0c5440b8a94496b70de78 |
httpd-manual-2.2.3-63.el5.x86_64.rpm | SHA-256: 2ef8a4f040b70cdde17a8475f468b53c1415419337adf4a133b187bb9e68f82d |
mod_ssl-2.2.3-63.el5.x86_64.rpm | SHA-256: 060a91e3d7b8932b1956eafe655a95ed67b3c7ba03cb943a4d708068c5057364 |
i386 | |
httpd-2.2.3-63.el5.i386.rpm | SHA-256: 02922e5654b5482e8c3042bb5054b5c84b07360d37fa6094df6edcf142ac21fa |
httpd-devel-2.2.3-63.el5.i386.rpm | SHA-256: 50883b96d9a519fac8b523e711189648d429a4c222985df4e98e5ae693b99425 |
httpd-manual-2.2.3-63.el5.i386.rpm | SHA-256: 1a65ef605815dc38cc5fc77f296f48c2d49bd9f8dab17444c54f2ec3bc4c6d7b |
mod_ssl-2.2.3-63.el5.i386.rpm | SHA-256: 0799887f1e57048ae3b7f4feed7517f3f92ada8478c0693a3bd714eabca8a9ad |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.