RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1425079 - 6.2.z: yum-rhn-plugin sending malformed request header
Summary: 6.2.z: yum-rhn-plugin sending malformed request header
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: yum-rhn-plugin
Version: 6.9
Hardware: Unspecified
OS: Unspecified
urgent
urgent
Target Milestone: rc
: ---
Assignee: Tomáš Kašpárek
QA Contact: Red Hat Satellite QA List
URL:
Whiteboard:
Depends On: 1423003
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-02-20 14:21 UTC by Jaroslav Reznik
Modified: 2017-03-16 15:57 UTC (History)
10 users (show)

Fixed In Version: yum-rhn-plugin-0.9.1-36.1.el6_2
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 1423003
Environment:
Last Closed: 2017-03-16 15:57:43 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
Testing and verification artefacts (25.55 KB, application/x-gzip)
2017-03-14 12:15 UTC, Radovan Drazny
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2017:0555 0 normal SHIPPED_LIVE yum-rhn-plugin bug fix update 2017-03-16 19:57:33 UTC

Description Jaroslav Reznik 2017-02-20 14:21:00 UTC
This bug has been copied from bug #1423003 and has been proposed
to be backported to 6.2 z-stream (EUS).

Comment 6 Radovan Drazny 2017-03-14 12:14:26 UTC
Reproduced on yum-rhn-plugin.noarch 0.9.1-36.el6.
Verified on yum-rhn-plugin-0.9.1-36.1.el6_2

Attached archive yum-rhn-plugin-testing.tar.gz contains files used for the testing and verification, and logs of output produced during the testing. 
Subdirectories 6.2, 6.5, 7.1 etc represent RHEL versions affected by the bug. Every directory contains subdirs oldplugin and newplugin, and file old-version.txt, which contains version of yum-rhn-plugin affected by the "CRLF in http header" bug. Oldplugin and newplugin dirs contain logs of test commands run for given version of yum plugin and httpd daemon. 
File systems.txt must contain FQDNs of test systems and its RHEL versions in format <fqdn>,RHEL_X.Y. 
File testing-commands.txt contains commands used to run testing commands on all systems specified in systems.txt file for each yum-plugin/httpd daemon combination. 
File work-table.ods contains LibreOffice spreadsheet containing results of commands for given yum-plugin/httpd daemon combination. It doesn't contain any surprises, as everything worked/not-worked as expected. "Not worked" cells mean that bug was successfully reproduced. 

Notes to myself: "HttpProtocolOptions Unsafe" must be placed inside ssl.conf VirtualHost config section for the given Sat 5 instance. To reliably test underlying httpd daemon it's better to use "ncat --ssl", eg: "printf "%s\n" 'GET /' | nc --ssl dell-per310-01.rhts.eng.bos.redhat.com 443", as all comms are encrypted by default.

Comment 7 Radovan Drazny 2017-03-14 12:15:28 UTC
Created attachment 1262890 [details]
Testing and verification artefacts

Comment 9 errata-xmlrpc 2017-03-16 15:57:43 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2017-0555.html


Note You need to log in before you can comment on or make changes to this bug.