Red Hat Bugzilla – Bug 1425079
6.2.z: yum-rhn-plugin sending malformed request header
Last modified: 2017-03-16 11:57:43 EDT
This bug has been copied from bug #1423003 and has been proposed to be backported to 6.2 z-stream (EUS).
Reproduced on yum-rhn-plugin.noarch 0.9.1-36.el6. Verified on yum-rhn-plugin-0.9.1-36.1.el6_2 Attached archive yum-rhn-plugin-testing.tar.gz contains files used for the testing and verification, and logs of output produced during the testing. Subdirectories 6.2, 6.5, 7.1 etc represent RHEL versions affected by the bug. Every directory contains subdirs oldplugin and newplugin, and file old-version.txt, which contains version of yum-rhn-plugin affected by the "CRLF in http header" bug. Oldplugin and newplugin dirs contain logs of test commands run for given version of yum plugin and httpd daemon. File systems.txt must contain FQDNs of test systems and its RHEL versions in format <fqdn>,RHEL_X.Y. File testing-commands.txt contains commands used to run testing commands on all systems specified in systems.txt file for each yum-plugin/httpd daemon combination. File work-table.ods contains LibreOffice spreadsheet containing results of commands for given yum-plugin/httpd daemon combination. It doesn't contain any surprises, as everything worked/not-worked as expected. "Not worked" cells mean that bug was successfully reproduced. Notes to myself: "HttpProtocolOptions Unsafe" must be placed inside ssl.conf VirtualHost config section for the given Sat 5 instance. To reliably test underlying httpd daemon it's better to use "ncat --ssl", eg: "printf "%s\n" 'GET /' | nc --ssl dell-per310-01.rhts.eng.bos.redhat.com 443", as all comms are encrypted by default.
Created attachment 1262890 [details] Testing and verification artefacts
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2017-0555.html