Bug 2079939
Summary: | httpd rebase to 2.4.53 | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Joe Orton <jorton> |
Component: | httpd | Assignee: | Luboš Uhliarik <luhliari> |
Status: | CLOSED ERRATA | QA Contact: | icesalov |
Severity: | unspecified | Docs Contact: | Lenka Špačková <lkuprova> |
Priority: | unspecified | ||
Version: | 9.0 | CC: | dklon, icesalov, luhliari, minfrin |
Target Milestone: | rc | Keywords: | Rebase, Triaged |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | httpd-2.4.53-1.el9 | Doc Type: | Enhancement |
Doc Text: |
.`httpd` rebased to version 2.4.53
The Apache HTTP Server has been updated to version 2.4.53, which provides bug fixes, enhancements, and security fixes over version 2.4.51 distributed with RHEL 9.0.
Notable changes in the `mod_proxy` and `mod_proxy_connect` modules include:
** `mod_proxy`: The length limit of the name of the controller has been increased
** `mod_proxy`: You can now selectively configure timeouts for backend and frontend
** `mod_proxy`: You can now disable TCP connections redirection by setting the `SetEnv proxy-nohalfclose` parameter
** `mod_proxy` and `mod_proxy_connect`: It is forbidden to change a status code after sending it to a client
In addition, a new `ldap` function has been added to the expression API, which can help prevent the LDAP injection vulnerability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-11-15 10:16:31 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Joe Orton
2022-04-28 14:55:37 UTC
*** Bug 2054189 has been marked as a duplicate of this bug. *** Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: httpd security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:8067 |