Bug 2268138

Summary: RHDS LDAP server Segmentation fault, apparent heap corruption, crashes in OpenSSL after SSL_do_handshake [11.7.z]
Product: Red Hat Directory Server Reporter: Viktor Ashirov <vashirov>
Component: 389-ds-baseAssignee: LDAP Maintainers <idm-ds-dev-bugs>
Status: CLOSED ERRATA QA Contact: LDAP QA Team <idm-ds-qe-bugs>
Severity: unspecified Docs Contact: Evgenia Martynyuk <emartyny>
Priority: unspecified    
Version: 11.7CC: idm-ds-dev-bugs, musoni, tbordaz
Target Milestone: DS11.7   
Target Release: dirsrv-11.7   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: 389-ds-base-1.4.3.34-3.module+el8dsrv+21391+b62d2223 Doc Type: Bug Fix
Doc Text:
.The `ns-slapd` binary is now linked with the thread-safe `libldap_r` library, no longer causing segmentation fault An upstream change in the build system introduced a regression by linking the `ns-slapd` binary with the non thread-safe `libldap` library instead of the thread-safe `libldap_r`. Consequently, the `ns-slapd` process could fail with a segmentation fault. This update fixes the problem with the build system code and the `ns-slapd` binary is now linked back with the thread-safe `libldap_r` library. As a result, the segmentation fault no longer occurs.
Story Points: ---
Clone Of: Environment:
Last Closed: 2024-03-19 11:26:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Comment 7 errata-xmlrpc 2024-03-19 11:26:50 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: redhat-ds:11 security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2024:1372