Skip to navigation

Bug Fix Advisory mod_wsgi bug fix and enhancement update

Advisory: RHBA-2012:1358-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-10-11
Last updated on: 2013-02-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated mod_wsgi packages that fix one bug and add one enhancement are now
available for Red Hat Enterprise Linux 6.

The mod_wsgi packages provide a Apache httpd module, which implements a WSGI
compliant interface for hosting Python based web applications.

This update fixes the following bug:

* Prior to this update, a misleading warning message from the mod_wsgi utilities
was logged during startup of the Apache httpd daemon. This update removes this
message from the mod_wsgi module. (BZ#670577)

This update also adds the following enhancement:

* With this update, access to the SSL connection state is now available in WSGI
scripts using the methods "mod_ssl.is_https" and "mod_ssl.var_lookup".
(BZ#719409)

All users of mod_wsgi are advised to upgrade to these updated packages, which
fix this bug and add this enhancement.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
mod_wsgi-3.2-3.el6.src.rpm     MD5: 284ff838bfd65c8d8e89ee43fb4625fb
SHA-256: ea7fc2a651f8c06bf6c52eb7e95790ce1978240dd34cac40f5dd40f60c27cd4e
 
IA-32:
mod_wsgi-3.2-3.el6.i686.rpm     MD5: e17b08322bb2b5cf4492a192e16d7008
SHA-256: 8da52da5bcf1712a2a0ea1f33fe0d5bd47f6077f78d575ede1bb03c20997aeb4
mod_wsgi-debuginfo-3.2-3.el6.i686.rpm     MD5: 64ccd9c6465952eb7ad00e7d23de84f9
SHA-256: bb456b41b76bb2fa17f32349a309862657c01f8f5f6eb760ae307cda0a916698
 
x86_64:
mod_wsgi-3.2-3.el6.x86_64.rpm     MD5: d97a0b78d687d8c4eb06bd0ed0bbb62b
SHA-256: bc8b8843df01c9cbb09150acfebab56163b6b252d9ebdb846f20f7e86e96f572
mod_wsgi-debuginfo-3.2-3.el6.x86_64.rpm     MD5: 6b36ebf4169e761dfe4f953b350f6f2f
SHA-256: 0b6a7ccde5e12ebd6dbb4b3c72d265c642f3a5085c78db93427756b24493aa96
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
mod_wsgi-3.2-3.el6.src.rpm     MD5: 284ff838bfd65c8d8e89ee43fb4625fb
SHA-256: ea7fc2a651f8c06bf6c52eb7e95790ce1978240dd34cac40f5dd40f60c27cd4e
 
x86_64:
mod_wsgi-3.2-3.el6.x86_64.rpm     MD5: d97a0b78d687d8c4eb06bd0ed0bbb62b
SHA-256: bc8b8843df01c9cbb09150acfebab56163b6b252d9ebdb846f20f7e86e96f572
mod_wsgi-debuginfo-3.2-3.el6.x86_64.rpm     MD5: 6b36ebf4169e761dfe4f953b350f6f2f
SHA-256: 0b6a7ccde5e12ebd6dbb4b3c72d265c642f3a5085c78db93427756b24493aa96
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
mod_wsgi-3.2-3.el6.src.rpm     MD5: 284ff838bfd65c8d8e89ee43fb4625fb
SHA-256: ea7fc2a651f8c06bf6c52eb7e95790ce1978240dd34cac40f5dd40f60c27cd4e
 
IA-32:
mod_wsgi-3.2-3.el6.i686.rpm     MD5: e17b08322bb2b5cf4492a192e16d7008
SHA-256: 8da52da5bcf1712a2a0ea1f33fe0d5bd47f6077f78d575ede1bb03c20997aeb4
mod_wsgi-debuginfo-3.2-3.el6.i686.rpm     MD5: 64ccd9c6465952eb7ad00e7d23de84f9
SHA-256: bb456b41b76bb2fa17f32349a309862657c01f8f5f6eb760ae307cda0a916698
 
PPC:
mod_wsgi-3.2-3.el6.ppc64.rpm     MD5: ca94c3f7a47affb369a3ae65996ae5f4
SHA-256: 6e90a801a19b5ab8c6e394559b75c8f88dbe67be5ca0eb45362b69b70ec3f6c1
mod_wsgi-debuginfo-3.2-3.el6.ppc64.rpm     MD5: 075c90c229f08c19d927172d44aab059
SHA-256: 1d0d707c74b76f784b2244988140824e51798c25106e0091b5c60ba9524dcdb6
 
s390x:
mod_wsgi-3.2-3.el6.s390x.rpm     MD5: f1312213f7932f3dc6bee04093780ad6
SHA-256: 8912ebb830c4be1d194fd7ebaa74e20afef870079d939a4dd7bb67c8904882fa
mod_wsgi-debuginfo-3.2-3.el6.s390x.rpm     MD5: d0e56f68f38cdeb5275e47bf80e80046
SHA-256: 17fb006b36f31d70b768316452a322a2d4f8ce989581db15acbbbaf0611db314
 
x86_64:
mod_wsgi-3.2-3.el6.x86_64.rpm     MD5: d97a0b78d687d8c4eb06bd0ed0bbb62b
SHA-256: bc8b8843df01c9cbb09150acfebab56163b6b252d9ebdb846f20f7e86e96f572
mod_wsgi-debuginfo-3.2-3.el6.x86_64.rpm     MD5: 6b36ebf4169e761dfe4f953b350f6f2f
SHA-256: 0b6a7ccde5e12ebd6dbb4b3c72d265c642f3a5085c78db93427756b24493aa96
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
mod_wsgi-3.2-3.el6.src.rpm     MD5: 284ff838bfd65c8d8e89ee43fb4625fb
SHA-256: ea7fc2a651f8c06bf6c52eb7e95790ce1978240dd34cac40f5dd40f60c27cd4e
 
IA-32:
mod_wsgi-3.2-3.el6.i686.rpm     MD5: e17b08322bb2b5cf4492a192e16d7008
SHA-256: 8da52da5bcf1712a2a0ea1f33fe0d5bd47f6077f78d575ede1bb03c20997aeb4
mod_wsgi-debuginfo-3.2-3.el6.i686.rpm     MD5: 64ccd9c6465952eb7ad00e7d23de84f9
SHA-256: bb456b41b76bb2fa17f32349a309862657c01f8f5f6eb760ae307cda0a916698
 
x86_64:
mod_wsgi-3.2-3.el6.x86_64.rpm     MD5: d97a0b78d687d8c4eb06bd0ed0bbb62b
SHA-256: bc8b8843df01c9cbb09150acfebab56163b6b252d9ebdb846f20f7e86e96f572
mod_wsgi-debuginfo-3.2-3.el6.x86_64.rpm     MD5: 6b36ebf4169e761dfe4f953b350f6f2f
SHA-256: 0b6a7ccde5e12ebd6dbb4b3c72d265c642f3a5085c78db93427756b24493aa96
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

670577 - warning message from mod_wsgi
719409 - make ssl functions available in wsgi access scripts.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/