news 28 Posted January 7, 2010 This is a multi-part message in MIME format... ------------=_1262879851-24326-3134 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2010:011 http://www.mandriva.com/security/ _______________________________________________________________________ Package : apache-conf Date : January 7, 2010 Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0, Enterprise Server 5.0 _______________________________________________________________________ Problem Description: This is a maintenance and bugfix release of apache-conf that mainly fixes so that the httpd service is handled more gracefully when reloading the apache server (#56857). Other fixes (where appliable): - fix #53887 (obsolete favicon.ico file in Apache default www pages) - workaround #47992 (apache does not start occasionally) - added logic to make it possible to set limits from the init script in an attempt to address #30849 and similar problems - added logic to easy debugging with gdb in the initscript Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. _______________________________________________________________________ References: https://qa.mandriva.com/56857 https://qa.mandriva.com/53887 https://qa.mandriva.com/47992 https://qa.mandriva.com/30849 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: bb27ec78df61e3824041b40640326d58 2008.0/i586/apache-conf-2.2.6-1.2mdv2008.0.i586.rpm 9d1f0eadee21092a275bad476e4af19b 2008.0/SRPMS/apache-conf-2.2.6-1.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: b18f991bbd2440d6eb5ccfae152d8586 2008.0/x86_64/apache-conf-2.2.6-1.2mdv2008.0.x86_64.rpm 9d1f0eadee21092a275bad476e4af19b 2008.0/SRPMS/apache-conf-2.2.6-1.2mdv2008.0.src.rpm Mandriva Linux 2009.0: 294f8d2acedfddc1315a503d3b8a8411 2009.0/i586/apache-conf-2.2.9-2.2mdv2009.0.i586.rpm a4bcc7aea8f9e147ec287f3088ea9a3a 2009.0/SRPMS/apache-conf-2.2.9-2.2mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: 8c2763367aad62175877cf08a4b1d274 2009.0/x86_64/apache-conf-2.2.9-2.2mdv2009.0.x86_64.rpm a4bcc7aea8f9e147ec287f3088ea9a3a 2009.0/SRPMS/apache-conf-2.2.9-2.2mdv2009.0.src.rpm Mandriva Linux 2009.1: 75b8b870e9a1fc16ec151372598a499b 2009.1/i586/apache-conf-2.2.11-5.2mdv2009.1.i586.rpm 09565a3f9af6afa93d5907981ed0114e 2009.1/SRPMS/apache-conf-2.2.11-5.2mdv2009.1.src.rpm Mandriva Linux 2009.1/X86_64: f5fc3d7eb10b0c5339d7a72523b404ec 2009.1/x86_64/apache-conf-2.2.11-5.2mdv2009.1.x86_64.rpm 09565a3f9af6afa93d5907981ed0114e 2009.1/SRPMS/apache-conf-2.2.11-5.2mdv2009.1.src.rpm Mandriva Linux 2010.0: 827624dec83034282296ad3e0ede70dd 2010.0/i586/apache-conf-2.2.14-1.2mdv2010.0.i586.rpm d2780a19c90fe26655b361610c926da5 2010.0/SRPMS/apache-conf-2.2.14-1.2mdv2010.0.src.rpm Mandriva Linux 2010.0/X86_64: 1a2948fbc57a5ccc30935e2f7852cfc1 2010.0/x86_64/apache-conf-2.2.14-1.2mdv2010.0.x86_64.rpm d2780a19c90fe26655b361610c926da5 2010.0/SRPMS/apache-conf-2.2.14-1.2mdv2010.0.src.rpm Corporate 4.0: b825c5d61f3d6d1604074e80c5c12aa9 corporate/4.0/i586/apache-conf-2.2.3-1.3.20060mlcs4.i586.rpm 56b14f9ddd9de3969feb1eb0d370f444 corporate/4.0/SRPMS/apache-conf-2.2.3-1.3.20060mlcs4.src.rpm Corporate 4.0/X86_64: 17b48e65e982ea1afc66da09ca785815 corporate/4.0/x86_64/apache-conf-2.2.3-1.3.20060mlcs4.x86_64.rpm 56b14f9ddd9de3969feb1eb0d370f444 corporate/4.0/SRPMS/apache-conf-2.2.3-1.3.20060mlcs4.src.rpm Mandriva Enterprise Server 5: 9208eaa3fefb764b6ab5018276b2fa61 mes5/i586/apache-conf-2.2.9-2.2mdvmes5.i586.rpm aa22cc5ab6e10214209938a8ea867072 mes5/SRPMS/apache-conf-2.2.9-2.2mdvmes5.src.rpm Mandriva Enterprise Server 5/X86_64: 2b8641268f37d51ca653ac488842c84a mes5/x86_64/apache-conf-2.2.9-2.2mdvmes5.x86_64.rpm aa22cc5ab6e10214209938a8ea867072 mes5/SRPMS/apache-conf-2.2.9-2.2mdvmes5.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLRdRymqjQ0CJFipgRApOmAKCPYgSoCLMl7lYyMtdkOTPd+p0EpQCgj8qM PffGsmis2hTvwoOHSM8aihg= =jzhq -----END PGP SIGNATURE----- ------------=_1262879851-24326-3134 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1262879851-24326-3134-- Share this post Link to post