Home > Security > Advisories

Advisories

Mandriva Advisories

Package name apache2
Date July 12th, 2006
Advisory ID MDKA-2006:029
Affected versions CS3.0
Synopsis Updated apache2 packages to address logging bug

Problem Description

A patch applied to the build of apache2, when built on x86_64,
can cause various issues in logging. These can include a corrupted
or empty /var/log/httpd/access_log. This affects the Corporate 3
products only.

Updated packages are provided that correct the issue.

Updated Packages

Corporate Server 3.0

 51cdedb4578130c6b43d1cfbbb1802f5  corporate/3.0/RPMS/apache2-2.0.48-6.12.C30mdk.i586.rpm
 44b4ecdf2c7a03cd9d1052f48b51e7e5  corporate/3.0/RPMS/apache2-common-2.0.48-6.12.C30mdk.i586.rpm
 7716fc52aa3652c85d19885ee8cb5172  corporate/3.0/RPMS/apache2-devel-2.0.48-6.12.C30mdk.i586.rpm
 3a88013713acbe76a4435cc63b9146c7  corporate/3.0/RPMS/apache2-manual-2.0.48-6.12.C30mdk.i586.rpm
 a96a90cad1bc02d91fa0d916e6722b58  corporate/3.0/RPMS/apache2-mod_cache-2.0.48-6.12.C30mdk.i586.rpm
 0e647fb4001850927f632c7c76d13948  corporate/3.0/RPMS/apache2-mod_dav-2.0.48-6.12.C30mdk.i586.rpm
 916fdff0c1215ded0605ec38803e383e  corporate/3.0/RPMS/apache2-mod_deflate-2.0.48-6.12.C30mdk.i586.rpm
 8f439ff8d1f7bfbc9b92413cdeb7a3d7  corporate/3.0/RPMS/apache2-mod_disk_cache-2.0.48-6.12.C30mdk.i586.rpm
 dfc7983bc68df51046fe3fa20906c58e  corporate/3.0/RPMS/apache2-mod_file_cache-2.0.48-6.12.C30mdk.i586.rpm
 5e6638879926641ea3623106c771ff46  corporate/3.0/RPMS/apache2-mod_ldap-2.0.48-6.12.C30mdk.i586.rpm
 738ea0c10cd1326348da2fff644c84bd  corporate/3.0/RPMS/apache2-mod_mem_cache-2.0.48-6.12.C30mdk.i586.rpm
 b7a00da859777a07dd6ca58a95a59efc  corporate/3.0/RPMS/apache2-mod_proxy-2.0.48-6.12.C30mdk.i586.rpm
 d9805ec08369409ad290c7c76011110a  corporate/3.0/RPMS/apache2-mod_ssl-2.0.48-6.12.C30mdk.i586.rpm
 623af80df573f7d7c25dfc5d5f03b2a3  corporate/3.0/RPMS/apache2-modules-2.0.48-6.12.C30mdk.i586.rpm
 3b48e584bec0e702b780f3c11c04e383  corporate/3.0/RPMS/apache2-source-2.0.48-6.12.C30mdk.i586.rpm
 41e1599ad5f70995879f4d25d031d83a  corporate/3.0/RPMS/libapr0-2.0.48-6.12.C30mdk.i586.rpm
 514190ad2bdb82014ccec55e0958cec1  corporate/3.0/SRPMS/apache2-2.0.48-6.12.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 946c0e2066bb1927690855698c95da52  x86_64/corporate/3.0/RPMS/apache2-2.0.48-6.12.C30mdk.x86_64.rpm
 9972a43b5286cca7d8a9f88411dfdacf  x86_64/corporate/3.0/RPMS/apache2-common-2.0.48-6.12.C30mdk.x86_64.rpm
 8b555921d87688467b1fd69b65dfe603  x86_64/corporate/3.0/RPMS/apache2-devel-2.0.48-6.12.C30mdk.x86_64.rpm
 6a88ccc17a74e86051b756595140dedf  x86_64/corporate/3.0/RPMS/apache2-manual-2.0.48-6.12.C30mdk.x86_64.rpm
 27995417941e5c13e519e5252b56c444  x86_64/corporate/3.0/RPMS/apache2-mod_cache-2.0.48-6.12.C30mdk.x86_64.rpm
 887087d5cd0d6ce2a28a183fab2d00a0  x86_64/corporate/3.0/RPMS/apache2-mod_dav-2.0.48-6.12.C30mdk.x86_64.rpm
 f05f0f0d23462ee97bbb2d112b96bdf3  x86_64/corporate/3.0/RPMS/apache2-mod_deflate-2.0.48-6.12.C30mdk.x86_64.rpm
 7e2b253ebf6e848d56e58111e366a286  x86_64/corporate/3.0/RPMS/apache2-mod_disk_cache-2.0.48-6.12.C30mdk.x86_64.rpm
 b445a2c3c99778c0505e0d9103ae3f64  x86_64/corporate/3.0/RPMS/apache2-mod_file_cache-2.0.48-6.12.C30mdk.x86_64.rpm
 b40819c0d77a643af4d76eee29070f4a  x86_64/corporate/3.0/RPMS/apache2-mod_ldap-2.0.48-6.12.C30mdk.x86_64.rpm
 9f4453463f73825d9e310ca6433103c3  x86_64/corporate/3.0/RPMS/apache2-mod_mem_cache-2.0.48-6.12.C30mdk.x86_64.rpm
 3f026ee03c1bd60ca3aa4b3d62e3e483  x86_64/corporate/3.0/RPMS/apache2-mod_proxy-2.0.48-6.12.C30mdk.x86_64.rpm
 b70366abe2562674ac95d52031457a17  x86_64/corporate/3.0/RPMS/apache2-mod_ssl-2.0.48-6.12.C30mdk.x86_64.rpm
 dc46129090ff199a6faf6708ffd3f3eb  x86_64/corporate/3.0/RPMS/apache2-modules-2.0.48-6.12.C30mdk.x86_64.rpm
 d570b5078a429be9931e337813fb21a4  x86_64/corporate/3.0/RPMS/apache2-source-2.0.48-6.12.C30mdk.x86_64.rpm
 af2986d99748b81bf1f83cbafd5ccba1  x86_64/corporate/3.0/RPMS/lib64apr0-2.0.48-6.12.C30mdk.x86_64.rpm
 514190ad2bdb82014ccec55e0958cec1  x86_64/corporate/3.0/SRPMS/apache2-2.0.48-6.12.C30mdk.src.rpm

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.