Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 649274

Summary: Infinite recursion in urllib2 on basicauth failure
Product: Red Hat Enterprise Linux 6 Reporter: Murilo Opsfelder Araujo <mopsfelder>
Component: pythonAssignee: Dave Malcolm <dmalcolm>
Status: CLOSED ERRATA QA Contact: Petr Šplíchal <psplicha>
Severity: medium Docs Contact:
Priority: low    
Version: 6.3CC: mopsfelder, ohudlick
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Linux   
Whiteboard:
Fixed In Version: python-2.6.6-1.el6.x86_64 Doc Type: Bug Fix
Doc Text:
Using an invalid username or password while attempting to authenticate against HTTPS via the urllib2 module resulted in infinite recursion. This behavior has been patched, and urllib2 now attempts authentication a maximum of five times before authentication is considered failed.
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-05-19 11:37:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Murilo Opsfelder Araujo 2010-11-03 12:29:15 UTC
Description of problem:
When you try to authenticate against an HTTPS using urllib2 python module it dies in a loop.

Version-Release number of selected component (if applicable):
# rpm -qa python
python-2.6.5-3.el6.x86_64

How reproducible:
Always.

Steps to Reproduce:
1. Create a python code that calls urllib2.urlopen with an invalid username and password
2.
3.
  
Actual results:
File "/usr/lib64/python2.6/socket.py", line 504, in create_connection
    sock = socket(af, socktype, proto)
RuntimeError: maximum recursion depth exceeded while calling a Python object

Expected results:
It should raise an error or die.

Additional info:
This has been fixed by upstream:
http://bugs.python.org/issue8797

Comment 2 Dave Malcolm 2011-01-26 23:22:24 UTC
Reproducible with vanilla 2.6.5 stdlib
Reproducible with python-2.6.5-3.el6.x86_64
Works OK for me with python-2.6.6-1.el6.x86_64
Works OK for me with python-2.6.6-9.el6.x86_64

Comment 4 Dave Malcolm 2011-01-26 23:26:44 UTC
Looks like
  http://svn.python.org/view?view=rev&revision=81637
is the relevant change here; this is in 2.6.6, which was r84293.

See also bug 669847.

Comment 7 Laura Bailey 2011-05-10 01:09:07 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Using an invalid username or password while attempting to authenticate against HTTPS via the urllib2 module resulted in infinite recursion. This behavior has been patched, and urllib2 now attempts authentication a maximum of five times before authentication is considered failed.

Comment 8 errata-xmlrpc 2011-05-19 11:37:08 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0554.html

Comment 9 errata-xmlrpc 2011-05-19 13:07:45 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0554.html