Skip to navigation

Bug Fix Advisory mod_python bug fix update

Advisory: RHBA-2012:1113-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

Updated mod_python packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The mod_python packages provide a module to embed the Python language
interpreter within the Apache web server, allowing handlers to be written in
Python.

This update fixes the following bug:

* Prior to this update, the publisher module did not correctly handle certain
authentication variables. As a consequence, the web server could return an "400
Bad Request" error if the "publisher" handler was used with an authentication
scheme other than "Basic". This update modifies the publisher.py code to handle
the autentication as expected. (BZ#431684)

All users of mod_python are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
mod_python-3.2.8-4.el5.src.rpm     MD5: 40d2ad7264834b834b32def4f704b487
SHA-256: 5e405b52153a8c8c652eff1fb130a45f40660f5602af656847c109be19f759cb
 
IA-32:
mod_python-3.2.8-4.el5.i386.rpm     MD5: 3c903208197857a778ec57264f0b21f7
SHA-256: 28cd9b6f40d7c1dd47ee61cce05dc95b12cf5585f7eb2cf397130693064d9d99
mod_python-debuginfo-3.2.8-4.el5.i386.rpm     MD5: b10cbbcbfdf2946b2ac1792b7727ac15
SHA-256: 52c8c019ef27dd70ec7b775610ef77a820847519c0102eaa813e50b14327a849
 
x86_64:
mod_python-3.2.8-4.el5.x86_64.rpm     MD5: 796b6cd0a07dd6016531a95aa91239eb
SHA-256: 8adb2d2ee2caab7e2ebce62e2947ab12b130dc1f12da8258e32258434d4fbc07
mod_python-debuginfo-3.2.8-4.el5.x86_64.rpm     MD5: 78978b9033132319e1cdfabf2a95aab5
SHA-256: bed10acb1c1252320a4d58128f169aeeeb6f53544a807dab5c627bf586448e00
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
mod_python-3.2.8-4.el5.src.rpm     MD5: 40d2ad7264834b834b32def4f704b487
SHA-256: 5e405b52153a8c8c652eff1fb130a45f40660f5602af656847c109be19f759cb
 
IA-32:
mod_python-3.2.8-4.el5.i386.rpm     MD5: 3c903208197857a778ec57264f0b21f7
SHA-256: 28cd9b6f40d7c1dd47ee61cce05dc95b12cf5585f7eb2cf397130693064d9d99
mod_python-debuginfo-3.2.8-4.el5.i386.rpm     MD5: b10cbbcbfdf2946b2ac1792b7727ac15
SHA-256: 52c8c019ef27dd70ec7b775610ef77a820847519c0102eaa813e50b14327a849
 
IA-64:
mod_python-3.2.8-4.el5.ia64.rpm     MD5: d5b1d409e5297efd374dc1263502ec0c
SHA-256: 0524e6825b1e409fbc01a1463228165d4ca23fcfcfb288ac81dc60c65234c6bd
mod_python-debuginfo-3.2.8-4.el5.ia64.rpm     MD5: bc241083713d91e0a1d7ec6a39606c5f
SHA-256: ad5191ed1c226fa1db97292a05988659c03c3db48a79f941389f84dfef870615
 
PPC:
mod_python-3.2.8-4.el5.ppc.rpm     MD5: f654f432c0eeec19fcfc50ec0385b0e6
SHA-256: 38865619b0f5f940ce79ddaac69d80533d40b073313d365091831c4d797b317b
mod_python-debuginfo-3.2.8-4.el5.ppc.rpm     MD5: 5ad22c4f07b9b1cb93c6a365c6ff172f
SHA-256: c4fcee512549b7ca5c2dd1213375c4a7697f13b43f63080a6d3296132cc271bc
 
s390x:
mod_python-3.2.8-4.el5.s390x.rpm     MD5: bac517a106ca6bf9f35d871283c26634
SHA-256: 4b6fde9cfec304d84789fb83750b2d56055b07a1890d890b02f2d6bf73522216
mod_python-debuginfo-3.2.8-4.el5.s390x.rpm     MD5: b1caf3e2ff6066d29c028ea3890880e9
SHA-256: 95eb0dfd65a209a131c29cb3c3021cba77625acc7791f0d0fc1bebc89d9bbe00
 
x86_64:
mod_python-3.2.8-4.el5.x86_64.rpm     MD5: 796b6cd0a07dd6016531a95aa91239eb
SHA-256: 8adb2d2ee2caab7e2ebce62e2947ab12b130dc1f12da8258e32258434d4fbc07
mod_python-debuginfo-3.2.8-4.el5.x86_64.rpm     MD5: 78978b9033132319e1cdfabf2a95aab5
SHA-256: bed10acb1c1252320a4d58128f169aeeeb6f53544a807dab5c627bf586448e00
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

431684 - mod_python.publisher fails with non-Basic auth



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/