Bug 2264534
| Summary: | RHDS LDAP server Segmentation fault, apparent heap corruption, crashes in OpenSSL after SSL_do_handshake | ||
|---|---|---|---|
| Product: | Red Hat Directory Server | Reporter: | Bijesh Thekkepat <bthekkep> |
| Component: | 389-ds-base | Assignee: | LDAP Maintainers <idm-ds-dev-bugs> |
| Status: | CLOSED ERRATA | QA Contact: | LDAP QA Team <idm-ds-qe-bugs> |
| Severity: | urgent | Docs Contact: | Evgenia Martynyuk <emartyny> |
| Priority: | urgent | ||
| Version: | 11.6 | CC: | cilmar, dbelyavs, dchen, ibodunov, idm-ds-dev-bugs, jverreng, knakai, msauton, musoni, progier, pwallend, rmarigny, tbordaz, tmihinto, tscherf, vashirov |
| Target Milestone: | DS11.9 | Keywords: | Triaged |
| Target Release: | dirsrv-11.9 | ||
| Hardware: | Unspecified | ||
| OS: | Linux | ||
| Whiteboard: | sync-to-jira | ||
| Fixed In Version: | 389-ds-base-1.4.3.39-3.module+el8dsrv+21677+4b22807b | Doc Type: | Bug Fix |
| Doc Text: |
.The `ns-slapd` binary is now linked with the thread-safe `libldap_r` library, no longer causing segmentation fault
An upstream change in the build system introduced a regression by linking the `ns-slapd` binary with the non thread-safe `libldap` library instead of the thread-safe `libldap_r`. Consequently, the `ns-slapd` process could fail with a segmentation fault. This update fixes the problem with the build system code and the `ns-slapd` binary is now linked back with the thread-safe `libldap_r` library. As a result, the segmentation fault no longer occurs.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2024-05-21 00:09:06 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Comment 34
Ding-Yi Chen
2024-02-29 05:38:49 UTC
*** Bug 2261940 has been marked as a duplicate of this bug. *** Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (redhat-ds:11 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2024:2934 |