Bug 1269660

Summary: Certificate verification fails with multiple https urls [el6/curl]
Product: Red Hat Enterprise Linux 6 Reporter: Nathan Kinder <nkinder>
Component: curlAssignee: Kamil Dudka <kdudka>
Status: CLOSED ERRATA QA Contact: Karel Srot <ksrot>
Severity: high Docs Contact: Petr Bokoc <pbokoc>
Priority: unspecified    
Version: 6.7CC: alexander.naumann, aurelien, ben.r.xiao, bugzilla, desintegr, emaldona, FlorianFranzen, hkario, kdudka, michal.bruncko, mtolson, netnut404, nkinder, ovasik, pbokoc, qe-baseos-security, redhatbugs, redhat, rhbug, wvoyek
Target Milestone: rcKeywords: Patch
Target Release: ---   
Hardware: Unspecified   
OS: Linux   
Whiteboard:
Fixed In Version: curl-7.19.7-50.el6 Doc Type: Bug Fix
Doc Text:
*NSS* no longer reuses TLS sessions for servers with different host names Previously, Network Security Services (NSS) could incorrectly reuse an existing TLS session to connect to a server with a different host name. This caused some HTTPS servers to refuse requests made within that session and to respond with HTTP code 400 (`Bad Request`). A patch which prevents reusing TLS sessions for different servers has been applied to *libcurl* source code, allowing NSS to successfully communicate with servers which require the HTTP host name to match the TLS session host name.
Story Points: ---
Clone Of: 1260678
: 1269855 (view as bug list) Environment:
Last Closed: 2016-05-11 00:36:25 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1241172, 1260678, 1269855    
Bug Blocks:    

Comment 1 Nathan Kinder 2015-10-07 21:12:09 UTC
This bug is for applying the workaround that has been accepted in curl upstream and in Fedora to curl in RHEL 6.x:

  https://github.com/bagder/curl/commit/958d2ffb

Comment 9 errata-xmlrpc 2016-05-11 00:36:25 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2016-0915.html