Bug 20800 - Bug with mod_proxy in new apache rpm
Bug with mod_proxy in new apache rpm
Product: Red Hat Linux
Classification: Retired
Component: apache (Show other bugs)
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Nalin Dahyabhai
Dale Lovelace
: 20028 (view as bug list)
Depends On:
  Show dependency treegraph
Reported: 2000-11-13 17:17 EST by Christian Lepine
Modified: 2007-04-18 12:29 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2000-11-24 00:34:50 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Christian Lepine 2000-11-13 17:17:10 EST
I have upgraded my redhat 7.0 installation with the new apache rpm but now 
the mod_proxy does not work any more.

Before the upgrade, the mod_proxy of apache was working fine.

I get a segmentation fault (11) in my /var/log/httpd/error_log when a 
client try to use the proxy configure with apache mod_proxy.

Christian Lepine
Comment 1 Tim Lundstrvm 2000-11-16 04:21:32 EST
It worked with the apache packet submitted with the standard release of RH7.0.
It is the apache-1.3.14-3 packet that breaks apache. I'm having exactly the same
Comment 2 Nalin Dahyabhai 2000-11-17 14:30:01 EST
Aaargh.  It appears that 1.3.12 *is* incompatible with 1.3.14, but only if both
have had the EAPI patch applied (EAPI functionality is used by mod_ssl). 
Tracing the error shows that it actually dies in mod_perl's proxy handler (at
least on my test box).  If you don't need mod_perl, try removing it  and see if
that works around it.  Errata packages are being prepped.
Comment 3 Arenas Belon, Carlo Marcelo 2000-11-24 00:34:48 EST
*** Bug 20028 has been marked as a duplicate of this bug. ***
Comment 4 Nalin Dahyabhai 2001-01-11 14:38:14 EST
Wow, those errata packages went out a while ago.  Time to close this.

Note You need to log in before you can comment on or make changes to this bug.