Bug 634687

Summary: Large POST may cause loop in mod_nss
Product: Red Hat Enterprise Linux 6 Reporter: Rob Crittenden <rcritten>
Component: mod_nssAssignee: Rob Crittenden <rcritten>
Status: CLOSED ERRATA QA Contact: Chandrasekar Kannan <ckannan>
Severity: high Docs Contact:
Priority: high    
Version: 6.1CC: alee, benl, dpal, jgalipea, jmagne, kchamart, rcritten
Target Milestone: rcKeywords: RHELNAK
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mod_nss-1.0.8-10.el6 Doc Type: Bug Fix
Doc Text:
Under certain circumstances, a large POST request could cause the mod_nss module to enter into an infinite loop. With this update, the underlying source code has been adapted to address this issue, and mod_nss now works as expected.
Story Points: ---
Clone Of: 620856 Environment:
Last Closed: 2011-05-19 14:15:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 620856    
Bug Blocks: 445047, 634685    

Comment 2 RHEL Program Management 2010-09-16 17:38:13 UTC
Thank you for your bug report. This issue was evaluated for inclusion
in the current release of Red Hat Enterprise Linux. Unfortunately, we
are unable to address this request in the current release. Because we
are in the final stage of Red Hat Enterprise Linux 6 development, only
significant, release-blocking issues involving serious regressions and
data corruption can be considered.

If you believe this issue meets the release blocking criteria as
defined and communicated to you by your Red Hat Support representative,
please ask your representative to file this issue as a blocker for the
current release. Otherwise, ask that it be evaluated for inclusion in
the next minor release of Red Hat Enterprise Linux.

Comment 7 Jaromir Hradilek 2011-02-17 15:56:33 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Under certain circumstances, a large POST request could cause the mod_nss module to enter into an infinite loop. With this update, the underlying source code has been adapted to address this issue, and mod_nss now works as expected.

Comment 9 Kashyap Chamarthy 2011-04-25 14:51:51 UTC
Note:

After discussion with Ade Lee,

This bug can _only_ be verified when TPS(pki-tps) pkg is available on RHEL 6.1 or above. As this behaviour can only be noticed in TPS subsystem which uses mod_nss to submit POST requests 

Verification procedure:
---------------------------
1/ Install and configure pki-ca, pki-kra,  pki-tks, pki-tps
2/ In TPS Admin Operations -> Advanced Configuration -- Edit and save a TPS profile('userKey') multiple times 
3/ Ensure CPU on TPS machine does not go through the roof.
----------------------------

Comment 10 Kashyap Chamarthy 2011-04-27 09:20:41 UTC
Note: pki-tps pkg is not (yet)available in RHEL6.1

After discussion with Ade, this bug is verified upstream. Turning this to verified.


Rob, I hope there is objection from you as well.

Comment 11 Kashyap Chamarthy 2011-04-27 13:23:07 UTC
(In reply to comment #10)
> Note: pki-tps pkg is not (yet)available in RHEL6.1
> 
> After discussion with Ade, this bug is verified upstream. Turning this to
> verified.
> 
> 
> Rob, I hope there is objection from you as well.

I mean _no_ objection :)

Comment 12 errata-xmlrpc 2011-05-19 14:15:07 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHBA-2011-0735.html