Bug 2184403
| Summary: | rebase httpd to 2.4.57 | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Joe Orton <jorton> |
| Component: | httpd | Assignee: | Luboš Uhliarik <luhliari> |
| Status: | CLOSED ERRATA | QA Contact: | Branislav Náter <bnater> |
| Severity: | unspecified | Docs Contact: | Lenka Špačková <lkuprova> |
| Priority: | unspecified | ||
| Version: | 9.0 | CC: | gfialova, luhliari |
| Target Milestone: | rc | Keywords: | Rebase, Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | httpd-2.4.57-1.el9 | Doc Type: | Enhancement |
| Doc Text: |
.`httpd` rebased to version 2.4.57
The Apache HTTP Server has been updated to version 2.4.57, which provides bug fixes, enhancements, and security fixes over version 2.4.53 available since RHEL 9.1.
Notable enhancements include:
* The `rotatelogs` utility provided with `httpd` introduces a new `-T` option to truncate all rotated logfiles except the initial log file.
* The `LDAPConnectionPoolTTL` directive of the `mod_ldap` module now accepts negative values to enable reuse of connections of any age. Previously, a negative value was handled as an error.
* Workers from the `mod_proxy_hcheck` module now correctly time out according to the worker timeout settings.
* The `hcmethod` parameter of the `mod_proxy_hcheck` module now provides new `GET11`, `HEAD11`, and `OPTIONS11` methods for HTTP/1.1 requests.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-11-07 08:30:29 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Joe Orton
2023-04-04 14:34:39 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: httpd and mod_http2 security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:6403 |