此内容没有您所选择的语言版本。
Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 2 Release Notes
For Use with the Red Hat JBoss Core Services Apache HTTP Server 2.4.62
Abstract
Preface 复制链接链接已复制到粘贴板!
Welcome to the Red Hat JBoss Core Services version 2.4.62 Service Pack 2 release.
Red Hat JBoss Core Services Apache HTTP Server is an open source web server developed by the Apache Software Foundation. The Apache HTTP Server includes the following features:
- Implements the current HTTP standards, including HTTP/1.1 and HTTP/2.
- Supports Transport Layer Security (TLS) encryption through OpenSSL, which provides secure connections between the web server and web clients.
- Supports extensible functionality through the use of modules, some of which are included with the Red Hat JBoss Core Services Apache HTTP Server.
This release of Red Hat JBoss Core Services includes some important security updates.
To report an error or to improve our documentation, log in to your Red Hat Jira account and submit an issue. If you do not have a Red Hat Jira account, then you will be prompted to create an account.
Procedure
- Click the following link to create a ticket.
- Enter a brief description of the issue in the Summary.
- Provide a detailed description of the issue or enhancement in the Description. Include a URL to where the issue occurs in the documentation.
- Clicking Create creates and routes the issue to the appropriate documentation team.
Making open source more inclusive 复制链接链接已复制到粘贴板!
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.
Chapter 1. New features and enhancements 复制链接链接已复制到粘贴板!
Red Hat JBoss Core Services (JBCS) 2.4.62 Service Pack 2 includes the following new features and enhancements.
Distributions of JBCS 2.4.62 Service Pack 2 for Windows Server include a version.txt file that provides the following product version details:
Red Hat JBCS httpd Server - Version 2.4.62.SP2
Red Hat JBCS httpd Server - Version 2.4.62.SP2
You can install the Apache HTTP Server 2.4.62 on Red Hat Enterprise Linux or Windows Server. For more information, see the following sections of the installation guide:
The steps to upgrade to the latest Red Hat JBoss Core Services (JBCS) release differ depending on whether you previously installed JBCS from RPM packages or from an archive file.
Upgrading JBCS when installed from RPM packages
If you installed an earlier release of the JBCS Apache HTTP Server from RPM packages on RHEL 7 or RHEL 8 by using the yum groupinstall or dnf groupinstall command, you can upgrade to the latest release. You can use the dnf groupupdate command to upgrade to the 2.4.62 release on RHEL 7 or RHEL 8.
JBCS does not provide an RPM distribution of the Apache HTTP Server on RHEL 9 or RHEL 10.
Upgrading JBCS when installed from an archive file
If you installed an earlier release of the JBCS Apache HTTP Server from an archive file, you must perform the following steps to upgrade to the Apache HTTP Server 2.4.62:
- Install the Apache HTTP Server 2.4.62.
- Set up the Apache HTTP Server 2.4.62.
- Remove the earlier version of Apache HTTP Server.
JBCS 2.4.62 installations on RHEL 8 or RHEL 9 do not include standalone versions of any package dependencies such as openssl-pkcs11, jansson, curl, brotli, and nghttp2. JBCS 2.4.62 distributions on RHEL 8 or RHEL 9 require that you install the platform-supplied version of any dependencies. JBCS 2.4.62 distributions on RHEL 7 or Window Server still include standalone versions of package dependencies.
The following procedure describes the recommended steps for upgrading a JBCS Apache HTTP Server 2.4.57 release that you installed from archive files to the latest 2.4.62 release.
Prerequisites
- If you are using Red Hat Enterprise Linux, you have root user access.
- If you are using Windows Server, you have administrative access.
- The Red Hat JBoss Core Services Apache HTTP Server 2.4.57 or earlier was previously installed in your system from an archive file.
Procedure
- Shut down any running instances of Red Hat JBoss Core Services Apache HTTP Server 2.4.57.
- Back up the Red Hat JBoss Core Services Apache HTTP Server 2.4.57 installation and configuration files.
- Install the Red Hat JBoss Core Services Apache HTTP Server 2.4.62 by using the .zip installation method for the current system (see Additional Resources below).
Migrate your configuration from the Red Hat JBoss Core Services Apache HTTP Server version 2.4.57 to version 2.4.62.
NoteThe Apache HTTP Server configuration files might have changed since the Apache HTTP Server 2.4.57 release. Consider updating the 2.4.62 version configuration files instead of overwriting them with the configuration files from a different version, such as the Apache HTTP Server 2.4.57.
- Remove the Red Hat JBoss Core Services Apache HTTP Server 2.4.57 root directory.
Additional Resources
Chapter 4. Resolved issues 复制链接链接已复制到粘贴板!
The following issues are resolved for this release:
| Issue | Summary |
|---|---|
| [Doc]: JBCS-1192 RHEL9 - mod_security blocks communication to mod_proxy_cluster | |
| [Doc]:[rhel-9-only] There is no mod_mime default AddLanguage/LanguagePriorities configuration for RHEL9 |
For details of any security fixes in this release, see the errata links in Advisories related to this release.
Chapter 5. Known issues 复制链接链接已复制到粘贴板!
There are no known issues for this release.
Chapter 6. Supported components 复制链接链接已复制到粘贴板!
For a full list of component versions that are supported in this release of Red Hat JBoss Core Services, see the Core Services Apache HTTP Server Component Details page. Before you attempt to access the Component Details page, you must ensure that you have an active Red Hat subscription and you are logged in to the Red Hat Customer Portal.
Chapter 7. Advisories related to this release 复制链接链接已复制到粘贴板!
The following advisories have been issued to document enhancements, bugfixes, and CVE fixes included in this release.