Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1141950 - Request to resolve upstream bug 55320
Request to resolve upstream bug 55320
Status: CLOSED ERRATA
Product: Red Hat Software Collections
Classification: Red Hat
Component: httpd24 (Show other bugs)
httpd24
x86_64 Linux
medium Severity medium
: rc
: 2.0
Assigned To: Jan Kaluža
Ondřej Pták
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2014-09-15 16:40 EDT by Coty Sutherland
Modified: 2014-12-09 13:08 EST (History)
7 users (show)

See Also:
Fixed In Version: httpd24-httpd-2.4.6-24.el7 httpd24-httpd-2.4.6-21.el6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-12-09 13:08:28 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Apache Bugzilla 55320 None None None Never
Red Hat Product Errata RHSA-2014:1972 normal SHIPPED_LIVE Low: httpd24-httpd security and bug fix update 2014-12-09 18:07:45 EST

  None (edit)
Description Coty Sutherland 2014-09-15 16:40:24 EDT
Description of problem:
Bug is resolved in 2.4.10, so it needs to be backported to the RHSCL httpd24 package based on 2.4.6. More details on upstream bug.

Version-Release number of selected component (if applicable):
2.4.6

How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:
Comment 5 Kiersten (Kerri) Anderson 2014-10-16 16:46:22 EDT
added to cc: jorton, kanderso
Comment 6 Joe Orton 2014-11-18 09:53:53 EST
Kerri can you set rhscl-1.2.z+ on this one?
Comment 9 Ondřej Pták 2014-12-08 06:21:43 EST
httpd24-httpd-2.4.6-18.el6  httpd24-httpd-2.4.6-21.el7
======================================================
:: [   PASS   ] :: Command 'curl -v -cacert /etc/pki/c/certs/localhost.crt -k https://127.0.0.1/test//hello.html &> output' (Expected 0, got 0)
:: [   PASS   ] :: Command 'cat output' (Expected 0, got 0)
:: [   FAIL   ] :: File 'output' should contain 'hello world' 
:: [   PASS   ] :: File 'output' should contain 'SSL connection using' 
:: [   PASS   ] :: Stop openssl s_server (Expected 0, got 0)
:: [   FAIL   ] :: File 'server_output' should not contain 'error'

httpd24-httpd-2.4.6-22.el6  httpd24-httpd-2.4.6-25.el7
======================================================
:: [   PASS   ] :: Command 'curl -v -cacert /etc/pki/c/certs/localhost.crt -k https://127.0.0.1/test//hello.html &> output' (Expected 0, got 0)
:: [   PASS   ] :: Command 'cat output' (Expected 0, got 0)
:: [   PASS   ] :: File 'output' should contain 'hello world' 
:: [   PASS   ] :: File 'output' should contain 'SSL connection using' 
:: [   PASS   ] :: Stop openssl s_server (Expected 0, got 0)
:: [   PASS   ] :: File 'server_output' should not contain 'error'
Comment 11 errata-xmlrpc 2014-12-09 13:08:28 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2014-1972.html

Note You need to log in before you can comment on or make changes to this bug.