- Issued:
- 2010-03-29
- Updated:
- 2010-03-29
RHEA-2010:0252 - Product Enhancement Advisory
Synopsis
httpd bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated httpd packages that fix bugs and add enhancements are now available.
Description
The Apache HTTP Server is a popular and freely-available Web server.
These updated httpd packages provide fixes for the following bugs:
- the mod_authnz_ldap module did not allow other modules to handle
authorization if no LDAP-specific requirements were used in the "Require"
directive. (BZ#448350)
- the httpd "init" script did not work correctly if the PidFile directive
was removed from httpd.conf. (BZ#505002)
- mod_ssl would fail to complete a handshake if more the 85 CAs were
configured using SSLCACertificateFile and/or SSLCACertificatePath.
(BZ#510515)
- the "X-Pad" header used for compatibility with old browser
implementations has been removed. (BZ#526110)
- mod_proxy_ajp could fail if uploading large files. (BZ#528640)
- .NET clients using the "Expect: 100-continue" header could cause spurious
responses. (BZ#533407)
- the OID() function supported in mod_ssl's SSLRequire directive could not
evaluate some extension types. (BZ#552942)
The following enhancements have also been made:
- the "DiscardPathInfo" flag (or "DPI") has been added to mod_rewrite.
(BZ#517500)
- the AuthLDAPRemoteUserAttribute directive has been added to
mod_authnz_ldap. (BZ#520838)
- the AuthLDAPDynamicGroups directive has been added to mod_authnz_ldap, to
enable support for dynamic groups. (BZ#252038)
- the mod_substitute module is now included. (BZ#539256)
All Apache users should install these updated packages which address these
issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 448350 - Problem on mod_authnz_ldap handle of "Require" configuration
- BZ - 505002 - httpd init script does not work when PidFile option is not set in httpd.conf
- BZ - 510515 - mod_ssl cannot handle more than 85 CAs
- BZ - 517500 - mod_rewrite adds path info postfix after a substitution occured
- BZ - 526110 - Remove X-Pad header from httpd (Apache)
- BZ - 528640 - mod_proxy_ajp fails with large file uploads
- BZ - 533407 - httpd causes connection/request problems with .Net framework clients
- BZ - 557049 - avoid use of rsync during build
- BZ - 566659 - [RFE] mod_ssl: Add SSLInsecureRenegotiation directive [rhel-5]
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
httpd-2.2.3-43.el5.src.rpm | SHA-256: c6926486655a766d251bf26a85f32f4f13db4014ebef2359a7847b17d6910b85 |
x86_64 | |
httpd-2.2.3-43.el5.x86_64.rpm | SHA-256: c9cec63ceb0624d942a8bd6f19d70643dbe395e48c560383ea61a3e019c988d8 |
httpd-debuginfo-2.2.3-43.el5.i386.rpm | SHA-256: 4e5c0d4dddab09e4d670088129b44347dcbea2dbb55b316c36fc0f12bcc0d48b |
httpd-debuginfo-2.2.3-43.el5.x86_64.rpm | SHA-256: d4b3b2e82c50541be5c4eb054d711574e25db91a9c6ec79fcf5bc770ace2813b |
httpd-devel-2.2.3-43.el5.i386.rpm | SHA-256: c409fa8fb6b7a60adaf51600fd13a042947053399014858bbdc7f6459ac0ff2e |
httpd-devel-2.2.3-43.el5.x86_64.rpm | SHA-256: 283a463d1dc85feaf4f9cd4204843e1eac8833bade3d929638ccbdb71980b1ac |
httpd-manual-2.2.3-43.el5.x86_64.rpm | SHA-256: 549fa3c6807b7b40177596802ce676b16cfd0011dbc0c9665b8c001290e47e65 |
mod_ssl-2.2.3-43.el5.x86_64.rpm | SHA-256: d8303f0f8b06761ddfc5bcffeb13488f9b2bfc6b4bc0eb3881c89040c091277f |
ia64 | |
httpd-2.2.3-43.el5.ia64.rpm | SHA-256: 2687f1cd743b6c637f50a4b3b90f09f01e2c69c47eae853dd6bcb9925f0db339 |
httpd-debuginfo-2.2.3-43.el5.ia64.rpm | SHA-256: 5cb0f255b2c23710d2fcd5c08c87c0d76d349d1faa2ddfe8969c488756f8fdca |
httpd-devel-2.2.3-43.el5.ia64.rpm | SHA-256: 62d7c4b616c0789a1ebe932e498bfeceaecbd567d3502a934b3596639c8c76f7 |
httpd-manual-2.2.3-43.el5.ia64.rpm | SHA-256: 1fe8730957e400d49ed8f782bc36d151871ff5b0113cdac1280650585f063eba |
mod_ssl-2.2.3-43.el5.ia64.rpm | SHA-256: e2177e3fbfc77165e29d1e2aa71c3f6c1e172d99e2430e0c71adff5e03f214b1 |
i386 | |
httpd-2.2.3-43.el5.i386.rpm | SHA-256: 67d91f2e75b041e59621f73c80739c501dddb6d3fb1d1a8a4e836fa87fb9565e |
httpd-debuginfo-2.2.3-43.el5.i386.rpm | SHA-256: 4e5c0d4dddab09e4d670088129b44347dcbea2dbb55b316c36fc0f12bcc0d48b |
httpd-devel-2.2.3-43.el5.i386.rpm | SHA-256: c409fa8fb6b7a60adaf51600fd13a042947053399014858bbdc7f6459ac0ff2e |
httpd-manual-2.2.3-43.el5.i386.rpm | SHA-256: 85576651bbdf241098f84119369d73260aabaa02287c755dd5d2df0fb93ba615 |
mod_ssl-2.2.3-43.el5.i386.rpm | SHA-256: f1e61e54bec0f55926014392ab3030dede7447d97c172b0351de099144228ee7 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
httpd-2.2.3-43.el5.src.rpm | SHA-256: c6926486655a766d251bf26a85f32f4f13db4014ebef2359a7847b17d6910b85 |
x86_64 | |
httpd-2.2.3-43.el5.x86_64.rpm | SHA-256: c9cec63ceb0624d942a8bd6f19d70643dbe395e48c560383ea61a3e019c988d8 |
httpd-debuginfo-2.2.3-43.el5.i386.rpm | SHA-256: 4e5c0d4dddab09e4d670088129b44347dcbea2dbb55b316c36fc0f12bcc0d48b |
httpd-debuginfo-2.2.3-43.el5.x86_64.rpm | SHA-256: d4b3b2e82c50541be5c4eb054d711574e25db91a9c6ec79fcf5bc770ace2813b |
httpd-debuginfo-2.2.3-43.el5.x86_64.rpm | SHA-256: d4b3b2e82c50541be5c4eb054d711574e25db91a9c6ec79fcf5bc770ace2813b |
httpd-devel-2.2.3-43.el5.i386.rpm | SHA-256: c409fa8fb6b7a60adaf51600fd13a042947053399014858bbdc7f6459ac0ff2e |
httpd-devel-2.2.3-43.el5.x86_64.rpm | SHA-256: 283a463d1dc85feaf4f9cd4204843e1eac8833bade3d929638ccbdb71980b1ac |
httpd-manual-2.2.3-43.el5.x86_64.rpm | SHA-256: 549fa3c6807b7b40177596802ce676b16cfd0011dbc0c9665b8c001290e47e65 |
mod_ssl-2.2.3-43.el5.x86_64.rpm | SHA-256: d8303f0f8b06761ddfc5bcffeb13488f9b2bfc6b4bc0eb3881c89040c091277f |
i386 | |
httpd-2.2.3-43.el5.i386.rpm | SHA-256: 67d91f2e75b041e59621f73c80739c501dddb6d3fb1d1a8a4e836fa87fb9565e |
httpd-debuginfo-2.2.3-43.el5.i386.rpm | SHA-256: 4e5c0d4dddab09e4d670088129b44347dcbea2dbb55b316c36fc0f12bcc0d48b |
httpd-debuginfo-2.2.3-43.el5.i386.rpm | SHA-256: 4e5c0d4dddab09e4d670088129b44347dcbea2dbb55b316c36fc0f12bcc0d48b |
httpd-devel-2.2.3-43.el5.i386.rpm | SHA-256: c409fa8fb6b7a60adaf51600fd13a042947053399014858bbdc7f6459ac0ff2e |
httpd-manual-2.2.3-43.el5.i386.rpm | SHA-256: 85576651bbdf241098f84119369d73260aabaa02287c755dd5d2df0fb93ba615 |
mod_ssl-2.2.3-43.el5.i386.rpm | SHA-256: f1e61e54bec0f55926014392ab3030dede7447d97c172b0351de099144228ee7 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
httpd-2.2.3-43.el5.src.rpm | SHA-256: c6926486655a766d251bf26a85f32f4f13db4014ebef2359a7847b17d6910b85 |
x86_64 | |
httpd-2.2.3-43.el5.x86_64.rpm | SHA-256: c9cec63ceb0624d942a8bd6f19d70643dbe395e48c560383ea61a3e019c988d8 |
httpd-debuginfo-2.2.3-43.el5.x86_64.rpm | SHA-256: d4b3b2e82c50541be5c4eb054d711574e25db91a9c6ec79fcf5bc770ace2813b |
mod_ssl-2.2.3-43.el5.x86_64.rpm | SHA-256: d8303f0f8b06761ddfc5bcffeb13488f9b2bfc6b4bc0eb3881c89040c091277f |
i386 | |
httpd-2.2.3-43.el5.i386.rpm | SHA-256: 67d91f2e75b041e59621f73c80739c501dddb6d3fb1d1a8a4e836fa87fb9565e |
httpd-debuginfo-2.2.3-43.el5.i386.rpm | SHA-256: 4e5c0d4dddab09e4d670088129b44347dcbea2dbb55b316c36fc0f12bcc0d48b |
mod_ssl-2.2.3-43.el5.i386.rpm | SHA-256: f1e61e54bec0f55926014392ab3030dede7447d97c172b0351de099144228ee7 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
httpd-2.2.3-43.el5.src.rpm | SHA-256: c6926486655a766d251bf26a85f32f4f13db4014ebef2359a7847b17d6910b85 |
s390x | |
httpd-2.2.3-43.el5.s390x.rpm | SHA-256: d8dddd578b793746458687ba0146c8fb32a595f4cbc9eff649fda04b89692041 |
httpd-debuginfo-2.2.3-43.el5.s390.rpm | SHA-256: 61d5e92701224bdd9b0a43db7864042d16d1d58e058eeace13a18a0caf55c004 |
httpd-debuginfo-2.2.3-43.el5.s390x.rpm | SHA-256: 373363055a7d3ccf3ac80769f1a84a78f10c4b850cddd54a6585dd670b7f1887 |
httpd-devel-2.2.3-43.el5.s390.rpm | SHA-256: 46aede68e5c3208977a18dc4973ddca3ac07de33acf845c125efcb7f3cb57f04 |
httpd-devel-2.2.3-43.el5.s390x.rpm | SHA-256: 33b59f5610cf49f61573a4f60e16b0543d04c5ded7f3590ed5a6c810f2636e13 |
httpd-manual-2.2.3-43.el5.s390x.rpm | SHA-256: 3ed6e3a634b441d7b6afb4796e41a07ab1e13d4378d39ee9f1a7004d55d39d31 |
mod_ssl-2.2.3-43.el5.s390x.rpm | SHA-256: d56497c4b7f22ea7d51f76c180f78a2f62484ff77e300b184d7bb7d48ab3bf9a |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
httpd-2.2.3-43.el5.src.rpm | SHA-256: c6926486655a766d251bf26a85f32f4f13db4014ebef2359a7847b17d6910b85 |
ppc | |
httpd-2.2.3-43.el5.ppc.rpm | SHA-256: a712544e635dac7b035f99bfd48e5c45811afa07d7636a71cc0efa0e8ade1912 |
httpd-debuginfo-2.2.3-43.el5.ppc.rpm | SHA-256: 44d5612f948d1539df7dd02778af62ef86ebed29645bd00b9ef15308d05cf0ae |
httpd-debuginfo-2.2.3-43.el5.ppc64.rpm | SHA-256: 70ae6f092d70fded414838c6cae4ea14cf5c4f45b4ef730cbaca2c7b6249bd11 |
httpd-devel-2.2.3-43.el5.ppc.rpm | SHA-256: 8695fb4780c1750cdaa44d860bc3fcbddd34e5f0247cb914b44f9cca51675503 |
httpd-devel-2.2.3-43.el5.ppc64.rpm | SHA-256: 0af31c526aab2d8037d52067d9a8cc62efb8a6bd44c41f256b71b2e33609ea70 |
httpd-manual-2.2.3-43.el5.ppc.rpm | SHA-256: 9763e12e2f684350c0840ff469914428619666f4fa64816ebf799cb9cdb6e12f |
mod_ssl-2.2.3-43.el5.ppc.rpm | SHA-256: 006fe8f86ca057487689c1ed44165550a6bd4dff147e27ca8400bc8b9dc1c2eb |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
httpd-2.2.3-43.el5.src.rpm | SHA-256: c6926486655a766d251bf26a85f32f4f13db4014ebef2359a7847b17d6910b85 |
x86_64 | |
httpd-2.2.3-43.el5.x86_64.rpm | SHA-256: c9cec63ceb0624d942a8bd6f19d70643dbe395e48c560383ea61a3e019c988d8 |
httpd-debuginfo-2.2.3-43.el5.i386.rpm | SHA-256: 4e5c0d4dddab09e4d670088129b44347dcbea2dbb55b316c36fc0f12bcc0d48b |
httpd-debuginfo-2.2.3-43.el5.x86_64.rpm | SHA-256: d4b3b2e82c50541be5c4eb054d711574e25db91a9c6ec79fcf5bc770ace2813b |
httpd-devel-2.2.3-43.el5.i386.rpm | SHA-256: c409fa8fb6b7a60adaf51600fd13a042947053399014858bbdc7f6459ac0ff2e |
httpd-devel-2.2.3-43.el5.x86_64.rpm | SHA-256: 283a463d1dc85feaf4f9cd4204843e1eac8833bade3d929638ccbdb71980b1ac |
httpd-manual-2.2.3-43.el5.x86_64.rpm | SHA-256: 549fa3c6807b7b40177596802ce676b16cfd0011dbc0c9665b8c001290e47e65 |
mod_ssl-2.2.3-43.el5.x86_64.rpm | SHA-256: d8303f0f8b06761ddfc5bcffeb13488f9b2bfc6b4bc0eb3881c89040c091277f |
i386 | |
httpd-2.2.3-43.el5.i386.rpm | SHA-256: 67d91f2e75b041e59621f73c80739c501dddb6d3fb1d1a8a4e836fa87fb9565e |
httpd-debuginfo-2.2.3-43.el5.i386.rpm | SHA-256: 4e5c0d4dddab09e4d670088129b44347dcbea2dbb55b316c36fc0f12bcc0d48b |
httpd-devel-2.2.3-43.el5.i386.rpm | SHA-256: c409fa8fb6b7a60adaf51600fd13a042947053399014858bbdc7f6459ac0ff2e |
httpd-manual-2.2.3-43.el5.i386.rpm | SHA-256: 85576651bbdf241098f84119369d73260aabaa02287c755dd5d2df0fb93ba615 |
mod_ssl-2.2.3-43.el5.i386.rpm | SHA-256: f1e61e54bec0f55926014392ab3030dede7447d97c172b0351de099144228ee7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.