Bug 2268138
Summary: | RHDS LDAP server Segmentation fault, apparent heap corruption, crashes in OpenSSL after SSL_do_handshake [11.7.z] | ||
---|---|---|---|
Product: | Red Hat Directory Server | Reporter: | Viktor Ashirov <vashirov> |
Component: | 389-ds-base | Assignee: | LDAP Maintainers <idm-ds-dev-bugs> |
Status: | CLOSED ERRATA | QA Contact: | LDAP QA Team <idm-ds-qe-bugs> |
Severity: | unspecified | Docs Contact: | Evgenia Martynyuk <emartyny> |
Priority: | unspecified | ||
Version: | 11.7 | CC: | idm-ds-dev-bugs, musoni, tbordaz |
Target Milestone: | DS11.7 | ||
Target Release: | dirsrv-11.7 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | 389-ds-base-1.4.3.34-3.module+el8dsrv+21391+b62d2223 | Doc Type: | Bug Fix |
Doc Text: |
.The `ns-slapd` binary is now linked with the thread-safe `libldap_r` library, no longer causing segmentation fault
An upstream change in the build system introduced a regression by linking the `ns-slapd` binary with the non thread-safe `libldap` library instead of the thread-safe `libldap_r`. Consequently, the `ns-slapd` process could fail with a segmentation fault. This update fixes the problem with the build system code and the `ns-slapd` binary is now linked back with the thread-safe `libldap_r` library. As a result, the segmentation fault no longer occurs.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2024-03-19 11:26:50 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Comment 7
errata-xmlrpc
2024-03-19 11:26:50 UTC
|