httpd-2.2.15-45.0.1.AXS4

エラータID: AXSA:2015-347:01

Release date: 
Wednesday, August 12, 2015 - 16:49
Subject: 
httpd-2.2.15-45.0.1.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
Low
Description: 

The Apache HTTP Server is a powerful, efficient, and extensible
web server.

Security issues fixed with this release:

CVE-2013-5704
The mod_headers module in the Apache HTTP Server 2.2.22 allows remote
attackers to bypass "RequestHeader unset" directives by placing a
header in the trailer portion of data sent with chunked transfer
coding. NOTE: the vendor states "this is not a security issue in httpd
as such."

Fixed bugs:

* The order of mod_proxy workers was not checked when httpd configuration was
reloaded. When mod_proxy workers were removed, added, or their order was
changed, their parameters and scores could become mixed. With this update,
the order of mod_proxy workers has been made internally consistent during
configuration reload.
* The local host certificate created during firstboot contained CA extensions,
which caused the httpd service to return warning messages. With this update,
the bug hes been fixed.
* The default mod_ssl configuration no longer enables support for SSL cipher
suites using the single DES, IDEA, or SEED encryption algorithms.
* The apachectl script did not take into account the HTTPD_LANG variable set in
the /etc/sysconfig/httpd file during graceful restarts. Consequently, httpd did
not use a changed value of HTTPD_LANG when the daemon was restarted gracefully.
To fix this bug, the script has been fixed to handle the HTTPD_LANG variable correctly.
* The mod_deflate module failed to check the original file size while extracting
files larger than 4 GB, making it impossible to extract large files. With this update,
the problem has been fixed.
* The httpd service did not check configuration before restart. When a
configuration contained an error, an attempt to restart httpd gracefully failed.
With this update, the problem has been fixed.
* The SSL_CLIENT_VERIFY environment variable was incorrectly handled when the
"SSLVerifyClient optional_no_ca" and "SSLSessionCache" options were used. When
an SSL session was resumed, the SSL_CLIENT_VERIFY value was set to "SUCCESS"
instead of the previously set "GENEROUS". SSL_CLIENT_VERIFY is now correctly set
to GENEROUS in this scenario.
* The ab utility did not correctly handle situations when an SSL connection was
closed after some data had already been read. As a consequence, ab did not work
correctly with SSL servers and printed "SSL read failed" error messages. With
this update, the described bug has been fixed.
* When a client presented a revoked certificate, log entries were created only
at the debug level. The log level of messages regarding a revoked certificate
has been increased to INFO, and administrators are now properly informed of this
situation.

Enhancements:

* A mod_proxy worker can now be set into drain mode (N) using the
balancer-manager web interface or using the httpd configuration file. A worker
in drain mode accepts only existing sticky sessions destined for itself and
ignores all other requests. The worker waits until all clients currently
connected to this worker complete their work before the worker is stopped. As a
result, drain mode enables to perform maintenance on a worker without affecting
clients.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. httpd-2.2.15-45.0.1.AXS4.src.rpm
    MD5: bc49653980611f26a1e82a3d0bdd19a9
    SHA-256: 9043f40ac7e86beed517e96dc119d042534f6ec3d0c12901e06293af13c9239a
    Size: 6.44 MB

Asianux Server 4 for x86
  1. httpd-2.2.15-45.0.1.AXS4.i686.rpm
    MD5: 62661fa5eadc0005ded268a97e7ced53
    SHA-256: 1f9d218a2ea24cf65db3b189662240ff80c99c356e53d6de651e84fcdb1e439b
    Size: 831.26 kB
  2. httpd-devel-2.2.15-45.0.1.AXS4.i686.rpm
    MD5: a78c61f7b0a2281d442588ff7823a8ad
    SHA-256: 3b809736332b7bdeca7fc79e46732b52254e231d2cbf0e3b78dad281b9ca5167
    Size: 153.62 kB
  3. httpd-manual-2.2.15-45.0.1.AXS4.noarch.rpm
    MD5: 08a8666d046b793b40040ba9a3806271
    SHA-256: b341c562f6ddfb672bdbda2f2a9b0326a5ea5297ef351b166b88517bd8d0b596
    Size: 786.61 kB
  4. httpd-tools-2.2.15-45.0.1.AXS4.i686.rpm
    MD5: c74b229b621617018094a57a98996057
    SHA-256: 9371e0beade32302f89acf7340dba83c802e8781edf13970100d338f6d9c11ef
    Size: 76.80 kB
  5. mod_ssl-2.2.15-45.0.1.AXS4.i686.rpm
    MD5: 6c1f4828abed81385932ecef8feca338
    SHA-256: 67efb0e7fbbca1aa7a3ae5a89b51294fa48cdfbe902011a8ce375dd5afdbef2e
    Size: 95.00 kB

Asianux Server 4 for x86_64
  1. httpd-2.2.15-45.0.1.AXS4.x86_64.rpm
    MD5: 6b859bc4813726f72ed45c21bf573077
    SHA-256: 9a3d27bee776ad2bcdb48673ee7ebf76354c690567c4c09373fc04ea3f8250f7
    Size: 830.03 kB
  2. httpd-devel-2.2.15-45.0.1.AXS4.x86_64.rpm
    MD5: 520b9764f5fba19e72913a29b1532836
    SHA-256: 6881a7247c4fb299eebdd5536cea7b767b74261e80f450917e229facd6ec94c8
    Size: 153.17 kB
  3. httpd-manual-2.2.15-45.0.1.AXS4.noarch.rpm
    MD5: c50651f975d61dc711ee001f6ff30391
    SHA-256: 0ddddcb4a323ce9b7c6c6eae27eaa46028f7b14acb8414ee2ab9022ea24ad2b1
    Size: 786.18 kB
  4. httpd-tools-2.2.15-45.0.1.AXS4.x86_64.rpm
    MD5: b06665a4d8c64a5654ce5d26fcbbf2c9
    SHA-256: 578df1166238a49b1ccff20a7bc50146139cde8ffdd4c357391a1773d9b64e29
    Size: 75.79 kB
  5. mod_ssl-2.2.15-45.0.1.AXS4.x86_64.rpm
    MD5: eace332b26e8d2faf32e3424c686198b
    SHA-256: e93ce0bba1045ead21a949fa56983ac024cffc23f37b035f78f28286fe83a1ef
    Size: 93.70 kB
  6. httpd-devel-2.2.15-45.0.1.AXS4.i686.rpm
    MD5: a78c61f7b0a2281d442588ff7823a8ad
    SHA-256: 3b809736332b7bdeca7fc79e46732b52254e231d2cbf0e3b78dad281b9ca5167
    Size: 153.62 kB