Bug 71972 - mod_ssl fails after rpm updates of apache on RH 6.2jp
Summary: mod_ssl fails after rpm updates of apache on RH 6.2jp
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: apache
Version: 6.2J
Hardware: i386
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Joe Orton
QA Contact: Brian Brock
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2002-08-20 15:01 UTC by James McDermott
Modified: 2014-08-25 00:55 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2004-09-21 10:51:52 UTC
Embargoed:


Attachments (Terms of Use)

Description James McDermott 2002-08-20 15:01:26 UTC
Hardware Environment: i386

Software Environment: Red Hat 6.2jp with latest Red Hat official patches.


Steps to Reproduce:
1. Install Red Hat 6.2jp
2. Install the latest patches from Red Hat (specifically 
apache-1.3.22-5.6.i386.rpm, openssl-0.9.5a-7.6.x.i386.rpm)
3.  Attempt to use mod_ssl enabled functions in Apache.

Actual Results:
The mod_ssl Apache module does not seem to work.  Attempts to browse to a https 
page on the server results in a segmentation fault in the apache log:
 child pid XXXX exit signal Segmentation fault (11)

Expected Results:
This problem does not occur with the base levels of 6.2jp installed.  There 
appears to be a incompatibility between the apache, openssl and mod_ssl versions 
when the rpm updates are applied.  The customer needs an official mod_ssl rpm 
created that will work properly with apache and openssl rpm updates in Red Hat 
6.2jp.

Comment 1 Joe Orton 2004-09-21 10:51:52 UTC
Thanks for the report.  This is a mass bug update; since this release
of Red Hat Linux is no longer supported, please either:

a) try and reproduce the bug with a supported version of Red Hat
Enterprise Linux or Fedora Core, and re-open this bug as appropriate
after changing the Product field, or,

b) if relevant, try and reproduce this bug using the current version
of the upstream package, and report the bug upstream.



Note You need to log in before you can comment on or make changes to this bug.