Bug 14147
| Summary: | The conf directive "SSLOptions +StdEnvVars" for mod_ssl will cause every request to seg fault. | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Retired] Red Hat Secure Web Server | Reporter: | George Dittmeier <george> | ||||
| Component: | secureweb | Assignee: | Preston Brown <pbrown> | ||||
| Status: | CLOSED ERRATA | QA Contact: | |||||
| Severity: | high | Docs Contact: | |||||
| Priority: | high | ||||||
| Version: | 3.2 | ||||||
| Target Milestone: | --- | ||||||
| Target Release: | --- | ||||||
| Hardware: | i386 | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2000-09-15 05:31:16 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Attachments: |
|
||||||
|
Description
George Dittmeier
2000-07-17 17:46:06 UTC
Created attachment 1227 [details]
my conf file for Redhat Secure Web Server (The SSLOptions directive is currently commented out for obvious reasons)
I've traced this one down to a call into the BSAFE library's ASN1_UTCTIME_print function, which is not a supported API call. Without the library source, the best we can do is to try to find a workaround. As long as the workaround gives access to the SSL environment variables I'll be happy. FYI, I tried using the mod_env package to make the variables I need accessible to my cgi progs, but this had no affect. I guess they simply aren't in the environment. Seems like the BSAFE code is causing problems in several areas (references in other bugs). Maybe a patch is in order? Oh, and THANK YOU for your timely response. Can we please get some kind of resolution to this bug? It's been over a month since the last update. I spending valuable resources working around it via silly cgi-based fixes. Is anybody listening out there? Hello? This fix is going into the security errata we're putting out. |