- Issued:
- 2005-05-19
- Updated:
- 2005-05-19
RHBA-2005:224 - Bug Fix Advisory
Synopsis
httpd bug fix update
Type/Severity
Bug Fix Advisory
Topic
The Apache HTTP server is a powerful, full-featured, efficient, and
freely-available Web server.
The "certwatch" utility, included in the mod_ssl package, sent a warning
email when a configured SSL certificate was due to expire. The address
used in the 'To:' field of the email included an unqualified hostname,
which caused issues with some MTAs such as qmail.
To allow use of the REMOTE_USER variable from a page processed during an
internal redirect (such as an ErrorDocument), the REDIRECT_REMOTE_USER
variable has been added.
The following bugs were also addressed:
- - The mod_proxy module did not correctly handle a case where the
connection to a client browser was aborted prematurely.
- - The mod_include module truncated the expansion of variables by one
character for those with lengths being a multiple of 64 bytes.
All users of httpd should upgrade to these updated packages, which resolve
these issues.
Description
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 3 x86_64
- Red Hat Enterprise Linux Server 3 ia64
- Red Hat Enterprise Linux Server 3 i386
- Red Hat Enterprise Linux Workstation 3 x86_64
- Red Hat Enterprise Linux Workstation 3 ia64
- Red Hat Enterprise Linux Workstation 3 i386
- Red Hat Enterprise Linux Desktop 3 x86_64
- Red Hat Enterprise Linux Desktop 3 i386
- Red Hat Enterprise Linux for IBM z Systems 3 s390x
- Red Hat Enterprise Linux for IBM z Systems 3 s390
- Red Hat Enterprise Linux for Power, big endian 3 ppc
Fixes
- BZ - 138359 - mod_proxy ignores abortion of downloads.
- BZ - 139403 - certwatch: invalid address in To header of warning mail
- BZ - 145666 - add REDIRECT_REMOTE_USER variable
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.