Skip to navigation

Bug Fix Advisory httpd bug fix and enhancement update

Advisory: RHBA-2011:1067-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated httpd packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 5.

The Apache HTTP Server is a popular web server.

These updated httpd packages include a number of bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Refer to the
Red Hat Enterprise Linux 5.7 Technical Notes for information about these
changes:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/httpd.html#RHBA-2011-1067

All users of httpd are advised to upgrade to these updated packages, which
provide numerous bug fixes and enhancements.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
httpd-2.2.3-53.el5.src.rpm
File outdated by:  RHSA-2014:0369
    MD5: 703b45b80608617265663007742286c7
SHA-256: af5f78f383ba38d7692b8662edfc3404d8282e53feea9441e6b59f71368152a0
 
IA-32:
httpd-devel-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: cbc3f049ab3b98d7ae5fd293c7c2d93e
SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6
httpd-manual-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 608fd30b7b670681e5b37c6df08669fc
SHA-256: 28cfe0c5e86df0d9a9c3b630a97b631f6ac87ca2eaf87b5bbde9147bd6167b23
 
x86_64:
httpd-devel-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: cbc3f049ab3b98d7ae5fd293c7c2d93e
SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6
httpd-devel-2.2.3-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 9ddc27478390c869aa180aa7be203293
SHA-256: e2081edb7e1b28604c321e759ce72bb418da015b0bc10ca7ddd0be1c83d40d46
httpd-manual-2.2.3-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: cd250bf75094f4c10a4df54edeea7b53
SHA-256: 66cc0aae3b1b67f038ad2801fe7ca263a076f1c87d4f8eeb96d4a3ef2cc4fd8e
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
httpd-2.2.3-53.el5.src.rpm
File outdated by:  RHSA-2014:0369
    MD5: 703b45b80608617265663007742286c7
SHA-256: af5f78f383ba38d7692b8662edfc3404d8282e53feea9441e6b59f71368152a0
 
IA-32:
httpd-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 89a58cc737de856ccbcf95224ad7ee8b
SHA-256: 532c3db8bfca8afef9951cf21901adeb31eaef5ee58c3b5a9ce44a0e6ae6119c
httpd-devel-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: cbc3f049ab3b98d7ae5fd293c7c2d93e
SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6
httpd-manual-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 608fd30b7b670681e5b37c6df08669fc
SHA-256: 28cfe0c5e86df0d9a9c3b630a97b631f6ac87ca2eaf87b5bbde9147bd6167b23
mod_ssl-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: e5ebd34df8b873576adff5751de0e474
SHA-256: 7cd6dc1280be416895825ed3627657281f74c0cfd03a6479f813b54979a701a5
 
IA-64:
httpd-2.2.3-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 357b031ad3e2cc8bfd49d578a53a9fc3
SHA-256: a09d891aa6f51e18fccbf04a604c488976c214bc8ca985a1cd6426dd4973e1c5
httpd-devel-2.2.3-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 509e46e310bb478461101a7ffb070e97
SHA-256: bfc5b346c26dbfb1151d7aaa06bae4f712d3c80335c6cc23f91932625647f29d
httpd-manual-2.2.3-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 0a8bca93489261125c2ae5a8ff4bf571
SHA-256: b1b7f0973e2525a4afe0a37760c953ebd5ab9d84a5279dc5b1b0c2a1c3c7e63f
mod_ssl-2.2.3-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0369
    MD5: ea4d9e71af33a20f8abf9ffa208c3062
SHA-256: 4556d1d9d245028d508ff0cf9dacddd1ab61109d44e585ba38077c3245177a28
 
PPC:
httpd-2.2.3-53.el5.ppc.rpm
File outdated by:  RHSA-2014:0369
    MD5: 1229738c03db1072b81cc6dfbf5129de
SHA-256: 27647fa45519cc9c3f26c16c9905613b54f915023e74577ddba0cedc0fc5a2b3
httpd-devel-2.2.3-53.el5.ppc.rpm
File outdated by:  RHSA-2014:0369
    MD5: aec60a829f378d5c648726aaaaad0f4e
SHA-256: c41cb88af9d57419ca9a92054d9f76f4a4bfd78389893be01f940d9699f98e75
httpd-devel-2.2.3-53.el5.ppc64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 8cc3006ee9ea880ed4f4f27f57402fcc
SHA-256: f7630b627f170bd87c2687d15cb57ca06f795ec91ff0a0551ba71fe531658673
httpd-manual-2.2.3-53.el5.ppc.rpm
File outdated by:  RHSA-2014:0369
    MD5: 49c947f607ec50b59aa36a84e0e4db8b
SHA-256: c59615241340ebff5466a0b915438b9ed65efab7a54d8be6e7f87bf77d15e4e2
mod_ssl-2.2.3-53.el5.ppc.rpm
File outdated by:  RHSA-2014:0369
    MD5: 3a6d7c0fdfc3c5bb33cbbc08c399b827
SHA-256: 80cb756c7fd0771133e02c2f346b43711b96fdcd50b9a405af935420ea125cf9
 
s390x:
httpd-2.2.3-53.el5.s390x.rpm
File outdated by:  RHSA-2014:0369
    MD5: 12e65e85330a462bf8411e8aa50a70af
SHA-256: a45ad5a2022dfbc3e4c81f20a82ff8d88f508d965de9841ea199732c752a23aa
httpd-devel-2.2.3-53.el5.s390.rpm
File outdated by:  RHSA-2014:0369
    MD5: bd63f3a46ed71cc71858a5676c1374b7
SHA-256: a8a1e52b1f04977c890eea336aa35a8cc910e937a6217db94038f9d7193fb387
httpd-devel-2.2.3-53.el5.s390x.rpm
File outdated by:  RHSA-2014:0369
    MD5: 43368b79bbfceae559ac949ac26fdb91
SHA-256: b70fe0e6bcbc3d4cff380ca888eba53324c9cac8ab2e3c2096d967d856302afe
httpd-manual-2.2.3-53.el5.s390x.rpm
File outdated by:  RHSA-2014:0369
    MD5: fc4bc371cc69bf465c64ebc71abda65d
SHA-256: 43ddc844a1de5df2df69d958900a841e1e11095c3201a1b03d33bdda8635b2ba
mod_ssl-2.2.3-53.el5.s390x.rpm
File outdated by:  RHSA-2014:0369
    MD5: 3372711e597cbc58dfb7e225daf8764b
SHA-256: 8155f13e3352c3fe492234e71b970d7d1597ea06593cddc3726c1406ef722755
 
x86_64:
httpd-2.2.3-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 78a1f4248930f1d5361cfa81c12df965
SHA-256: aacdec674e841e8b801fc6d0b189a13b3e8ccfa754c8d8e73917684a3b8d29f1
httpd-devel-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: cbc3f049ab3b98d7ae5fd293c7c2d93e
SHA-256: 2f91b835e5b574e1c3c7395f5bd90f7da1c7c0d22d04c6e97a8db328feb654a6
httpd-devel-2.2.3-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 9ddc27478390c869aa180aa7be203293
SHA-256: e2081edb7e1b28604c321e759ce72bb418da015b0bc10ca7ddd0be1c83d40d46
httpd-manual-2.2.3-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: cd250bf75094f4c10a4df54edeea7b53
SHA-256: 66cc0aae3b1b67f038ad2801fe7ca263a076f1c87d4f8eeb96d4a3ef2cc4fd8e
mod_ssl-2.2.3-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 8bad730f234cbeec679226588b438d26
SHA-256: 550aee2aa49b129041ebb85ecac4dc0511c74531f3d22cfb7454751269f8fdbb
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
httpd-2.2.3-53.el5.src.rpm
File outdated by:  RHSA-2014:0369
    MD5: 703b45b80608617265663007742286c7
SHA-256: af5f78f383ba38d7692b8662edfc3404d8282e53feea9441e6b59f71368152a0
 
IA-32:
httpd-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: 89a58cc737de856ccbcf95224ad7ee8b
SHA-256: 532c3db8bfca8afef9951cf21901adeb31eaef5ee58c3b5a9ce44a0e6ae6119c
mod_ssl-2.2.3-53.el5.i386.rpm
File outdated by:  RHSA-2014:0369
    MD5: e5ebd34df8b873576adff5751de0e474
SHA-256: 7cd6dc1280be416895825ed3627657281f74c0cfd03a6479f813b54979a701a5
 
x86_64:
httpd-2.2.3-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 78a1f4248930f1d5361cfa81c12df965
SHA-256: aacdec674e841e8b801fc6d0b189a13b3e8ccfa754c8d8e73917684a3b8d29f1
mod_ssl-2.2.3-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0369
    MD5: 8bad730f234cbeec679226588b438d26
SHA-256: 550aee2aa49b129041ebb85ecac4dc0511c74531f3d22cfb7454751269f8fdbb
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

264681 - mod_ldap stops caching with per-vhost directive use
379811 - Apache CacheMaxExpire directive ignored (upstream reported bug with patch)
552303 - SEGV due to corrupt bucket brigades when using mod_proxy
580008 - httpd crash after premature connection termination
604727 - mod_authnz_ldap Apache module fails when 'refer' entries returned from LDAP
612198 - RFE: add mod_reqtimeout to mitigate against slowloris attack
632407 - proxy: error reading status line from remote server
636427 - mod_ssl possible memory corruption
649648 - mod_ssl: startup fails with duplicate SSL vhost configurations
673276 - mod_headers "edit" replaces multiple headers with the first match
674102 - prefork children in keepalive do not exit on graceful
678057 - ProxyPassReverse breaks with balancer:// URLs (upstream #45434)
679994 - mod_filter cannot match against response headers from CGI script
691497 - mod_proxy with SSLProxyEngine truncates files fetched with chunked encoding Summary
696488 - Cannot load /etc/httpd/modules/mod_proxy.so into server: /etc/httpd/modules/mod_proxy.so: undefined symbol: ap_get_server_banner


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/