Date: Thu, 30 Dec 1999 11:20:19 -0500 (EST)
From: Preston Brown pbrown@redhat.com
To: redhat-watch-list@redhat.com
Reply to: redhat-watch-list@redhat.com
Red Hat, Inc. Bug Fix Advisory
Synopsis: Apache bugfix release available for Red Hat Linux
6.1
Advisory ID: RHBA-1999:062-01
Issue date: 1999-12-30
Updated on: 1999-12-30
Keywords: apache suexec docroot manual httpd.conf apxs
logrotate
Cross references: N-A
1. Topic:
A bugfix release of Apache is available which corrects problems
with httpd.conf default values, fixes building third party modules
with apxs, and performs other general cleanups. Anyone who has had
problems building third party modules is encouraged to upgrade.
2. Relevant releases/architectures:
Red Hat Linux 6.x – intel alpha sparc
3. Problem description:
APXS– the utility used for building apache modules as DSOs–
had problems as shipped in 6.1. In addition, we intended to ship a
unified httpd.conf default configuration file with our apache
included in Red Hat Linux 6.1, but this did not make it into the
final release; this has been corrected. The apache manual is now a
subpackage in its own right, so you may choose to install it or
leave it out if you wish. The logrotate script complained if httpd
was not running, and this has been fixed. suexec is no longer suid
by default, and while no security hole in suexec has been
identified, it was determined that it was safer to leave this
choice up to the system administrator.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Uvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
for more info):
5256 – manual should be on a subpackage
5367 – small cleanup of default conf files (1.3.9-4) (patch to
follow)
5650 – 1.3.9 apache-devel breaks PHP
6115 – httpd.conf didn’t upgrade with
6655 – incorrect pointers to module documentation in conf files
7074 – /etc/logrotate.d/apache gives error if apache isn’t
running
6. Obsoleted by:
N-A
7. Conflicts with:
N-A
8. RPMs required:
Red Hat Linux 6.1:
Intel:
ftp://updates.redhat.com/6.1/i386/apache-1.3.9-8.i386.rpm
ftp://updates.redhat.com/6.1/i386/apache-devel-1.3.9-8.i386.rpm
ftp://updates.redhat.com/6.1/i386/apache-manual-1.3.9-8.i386.rpm
Alpha:
ftp://updates.redhat.com/6.1/alpha/apache-1.3.9-8.alpha.rpm
ftp://updates.redhat.com/6.1/alpha/apache-devel-1.3.9-8.alpha.rpm
ftp://updates.redhat.com/6.1/alpha/apache-manual-1.3.9-8.alpha.rpm
Sparc:
ftp://updates.redhat.com/6.1/sparc/apache-1.3.9-8.sparc.rpm
ftp://updates.redhat.com/6.1/sparc/apache-devel-1.3.9-8.sparc.rpm
ftp://updates.redhat.com/6.1/sparc/apache-manual-1.3.9-8.sparc.rpm
Source packages:
ftp://updates.redhat.com/6.1/SRPMS/apache-1.3.9-8.src.rpm
9. Verification:
MD5 sum Package Name
f92653f5d5c79ac02e60e811fc36833c i386/apache-1.3.9-8.i386.rpm 5288eba941e074ebcdb21952615766e4 i386/apache-devel-1.3.9-8.i386.rpm 4c1f0520ec6debcab4484eab4b3cace7 i386/apache-manual-1.3.9-8.i386.rpm 26fd3e0d8bb6bdeca36727e5fc839826 alpha/apache-1.3.9-8.alpha.rpm 2f08af6da3bb5b4e248d30347c28b523 alpha/apache-devel-1.3.9-8.alpha.rpm 2b470f06cbe4ea632f1e98568cd66b53 alpha/apache-manual-1.3.9-8.alpha.rpm c597fb29ad7effbe3bebe2e8d2926dd8 sparc/apache-1.3.9-8.sparc.rpm c516cf46a00a9f0ef6aef3d9b5107d9d sparc/apache-devel-1.3.9-8.sparc.rpm 1041b5c625c8a8bacd29642e832fea0a sparc/apache-manual-1.3.9-8.sparc.rpm e2445d530aaa17b4b6cf44ae5d413599 SRPMS/apache-1.3.9-8.src.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm –checksig
If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg
10. References:
N-A
—
Preston Brown
Red Hat, Inc.
pbrown@redhat.com